Ubuntu Security Notice (C) 2010-2014 Canonical, Inc. / NASL script (C) 2010-2014 Tenable Network Security, Inc.
The remote Ubuntu host is missing one or more security-related patches.
It was discovered that KGet did not properly perform input validation
when processing metalink files. If a user were tricked into opening a
crafted metalink file, a remote attacker could overwrite files via
directory traversal, which could eventually lead to arbitrary code
It was discovered that KGet would not always wait for user
confirmation when downloading metalink files. If a user selected a
file to download but did not confirm or cancel the download, KGet
would proceed with the download, overwriting any file with the same
name. This issue only affected Ubuntu 10.04 LTS. (CVE-2010-1511).
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 6.4
CVSS Temporal Score : 5.6
Public Exploit Available : true