Mandriva Linux Security Advisory : kdelibs4 (MDVSA-2010:027)

high Nessus Plugin ID 48170

Language:

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

Multiple vulnerabilities was discovered and corrected in kdelibs4 :

KDE KSSL in kdelibs 3.5.4, 4.2.4, and 4.3 does not properly handle a '�' (NUL) character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408 (CVE-2009-2702).

The JavaScript garbage collector in WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 does not properly handle allocation failures, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document that triggers write access to an offset of a NULL pointer.
(CVE-2009-1687).

WebKit in Apple Safari before 4.0.2, KHTML in kdelibs in KDE, QtWebKit (aka Qt toolkit), and possibly other products does not properly handle numeric character references, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document (CVE-2009-1725).

Use-after-free vulnerability in WebKit, as used in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome 1.0.154.53, and possibly other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) by setting an unspecified property of an HTML tag that causes child elements to be freed and later accessed when an HTML error occurs, related to recursion in certain DOM event handlers. (CVE-2009-1690).

WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 does not initialize a pointer during handling of a Cascading Style Sheets (CSS) attr function call with a large numerical argument, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document (CVE-2009-1698).

KDE Konqueror allows remote attackers to cause a denial of service (memory consumption) via a large integer value for the length property of a Select object, a related issue to CVE-2009-1692 (CVE-2009-2537).

The gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc in FreeBSD 6.4 and 7.2, NetBSD 5.0, and OpenBSD 4.5 allows context-dependent attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a large precision value in the format argument to a printf function, related to an array overrun. (CVE-2009-0689).

WebKit, as used in Safari before 3.2.3 and 4 Public Beta, on Apple Mac OS X 10.4.11 and 10.5 before 10.5.7 and Windows allows remote attackers to execute arbitrary code via a crafted SVGList object that triggers memory corruption (CVE-2009-0945).

The updated packages have been patched to correct these issues.

Solution

Update the affected packages.

Plugin Details

Severity: High

ID: 48170

File Name: mandriva_MDVSA-2010-027.nasl

Version: 1.21

Type: local

Published: 7/30/2010

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:libnepomuk4, p-cpe:/a:mandriva:linux:libplasma3, p-cpe:/a:mandriva:linux:libsolid4, p-cpe:/a:mandriva:linux:libthreadweaver4, cpe:/o:mandriva:linux:2009.1, p-cpe:/a:mandriva:linux:kdelibs4-core, p-cpe:/a:mandriva:linux:kdelibs4-devel, p-cpe:/a:mandriva:linux:lib64kde3support4, p-cpe:/a:mandriva:linux:lib64kdecore5, p-cpe:/a:mandriva:linux:lib64kdefakes5, p-cpe:/a:mandriva:linux:lib64kdesu5, p-cpe:/a:mandriva:linux:lib64kdeui5, p-cpe:/a:mandriva:linux:lib64kdnssd4, p-cpe:/a:mandriva:linux:lib64kfile4, p-cpe:/a:mandriva:linux:lib64khtml5, p-cpe:/a:mandriva:linux:lib64kimproxy4, p-cpe:/a:mandriva:linux:lib64kio5, p-cpe:/a:mandriva:linux:lib64kjs4, p-cpe:/a:mandriva:linux:lib64kjsapi4, p-cpe:/a:mandriva:linux:lib64kjsembed4, p-cpe:/a:mandriva:linux:lib64kmediaplayer4, p-cpe:/a:mandriva:linux:lib64knewstuff2_4, p-cpe:/a:mandriva:linux:lib64knotifyconfig4, p-cpe:/a:mandriva:linux:lib64kntlm4, p-cpe:/a:mandriva:linux:lib64kparts4, p-cpe:/a:mandriva:linux:lib64kpty4, p-cpe:/a:mandriva:linux:lib64krosscore4, p-cpe:/a:mandriva:linux:lib64krossui4, p-cpe:/a:mandriva:linux:lib64ktexteditor4, p-cpe:/a:mandriva:linux:lib64kunittest4, p-cpe:/a:mandriva:linux:lib64kutils4, p-cpe:/a:mandriva:linux:lib64nepomuk4, p-cpe:/a:mandriva:linux:lib64plasma3, p-cpe:/a:mandriva:linux:lib64solid4, p-cpe:/a:mandriva:linux:lib64threadweaver4, p-cpe:/a:mandriva:linux:libkde3support4, p-cpe:/a:mandriva:linux:libkdecore5, p-cpe:/a:mandriva:linux:libkdefakes5, p-cpe:/a:mandriva:linux:libkdesu5, p-cpe:/a:mandriva:linux:libkdeui5, p-cpe:/a:mandriva:linux:libkdnssd4, p-cpe:/a:mandriva:linux:libkfile4, p-cpe:/a:mandriva:linux:libkhtml5, p-cpe:/a:mandriva:linux:libkimproxy4, p-cpe:/a:mandriva:linux:libkio5, p-cpe:/a:mandriva:linux:libkjs4, p-cpe:/a:mandriva:linux:libkjsapi4, p-cpe:/a:mandriva:linux:libkjsembed4, p-cpe:/a:mandriva:linux:libkmediaplayer4, p-cpe:/a:mandriva:linux:libknewstuff2_4, p-cpe:/a:mandriva:linux:libknotifyconfig4, p-cpe:/a:mandriva:linux:libkntlm4, p-cpe:/a:mandriva:linux:libkparts4, p-cpe:/a:mandriva:linux:libkpty4, p-cpe:/a:mandriva:linux:libkrosscore4, p-cpe:/a:mandriva:linux:libkrossui4, p-cpe:/a:mandriva:linux:libktexteditor4, p-cpe:/a:mandriva:linux:libkunittest4, p-cpe:/a:mandriva:linux:libkutils4

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/27/2010

Reference Information

CVE: CVE-2009-0689, CVE-2009-0945, CVE-2009-1687, CVE-2009-1690, CVE-2009-1698, CVE-2009-1725, CVE-2009-2537, CVE-2009-2702

BID: 34924, 35271, 35309, 35318, 35446, 35510, 36229

CWE: 119, 189, 310, 399, 94

MDVSA: 2010:027