How to Buy
This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Updated kdegraphics packages that fix two security issues are now
available for Red Hat Enterprise Linux 5.
This update has been rated as having critical security impact by the
Red Hat Security Response Team.
The kdegraphics packages contain applications for the K Desktop
Environment (KDE). Scalable Vector Graphics (SVG) is an XML-based
language to describe vector images. KSVG is a framework aimed at
implementing the latest W3C SVG specifications.
A use-after-free flaw was found in the KDE KSVG animation element
implementation. A remote attacker could create a specially crafted SVG
image, which once opened by an unsuspecting user, could cause a denial
of service (Konqueror crash) or, potentially, execute arbitrary code
with the privileges of the user running Konqueror. (CVE-2009-1709)
A NULL pointer dereference flaw was found in the KDE, KSVG SVGList
interface implementation. A remote attacker could create a specially
crafted SVG image, which once opened by an unsuspecting user, would
cause memory corruption, leading to a denial of service (Konqueror
All users of kdegraphics should upgrade to these updated packages,
which contain backported patches to correct these issues. The desktop
must be restarted (log out, then log back in) for this update to take
See also :
Update the affected kdegraphics and / or kdegraphics-devel packages.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.3
Public Exploit Available : true
Family: Red Hat Local Security Checks
Nessus Plugin ID: 39531 ()
Bugtraq ID: 3492435334
CVE ID: CVE-2009-0945CVE-2009-1709
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.