CVE-2010-1000

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Directory traversal vulnerability in KGet in KDE SC 4.0.0 through 4.4.3 allows remote attackers to create arbitrary files via directory traversal sequences in the name attribute of a file element in a metalink file.

References

http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051692.html

http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058580.html

http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html

http://marc.info/?l=oss-security&m=127378789518426&w=2

http://osvdb.org/64690

http://secunia.com/advisories/39528

http://secunia.com/advisories/39787

http://secunia.com/advisories/42423

http://secunia.com/secunia_research/2010-69/

http://securitytracker.com/id?1023984

http://www.kde.org/info/security/advisory-20100513-1.txt

http://www.mandriva.com/security/advisories?name=MDVSA-2010:098

http://www.securityfocus.com/archive/1/511281/100/0/threaded

http://www.securityfocus.com/archive/1/511294/100/0/threaded

http://www.securityfocus.com/bid/40141

http://www.ubuntu.com/usn/USN-938-1

http://www.vupen.com/english/advisories/2010/1142

http://www.vupen.com/english/advisories/2010/1144

http://www.vupen.com/english/advisories/2010/3096

http://www.vupen.com/english/advisories/2011/1101

https://exchange.xforce.ibmcloud.com/vulnerabilities/58628

Details

Source: MITRE

Published: 2010-05-17

Updated: 2018-10-10

Type: CWE-22

Risk Information

CVSS v2

Base Score: 5.8

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:P

Impact Score: 4.9

Exploitability Score: 8.6

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:kde:kde_sc:4.0.0:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.0.0:alpha1:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.0.0:alpha2:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.0.0:beta1:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.0.0:beta2:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.0.0:beta3:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.0.0:beta4:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.0.0:rc1:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.0.0:rc2:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.0.1:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.0.2:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.0.3:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.0.4:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.0.5:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.1.0:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.1.0:alpha1:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.1.0:beta1:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.1.0:beta2:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.1.0:rc:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.1.1:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.1.2:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.1.3:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.1.4:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.1.80:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.1.85:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.1.96:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.2:beta2:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.2:rc:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.2.0:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.2.1:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.2.2:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.2.3:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.2.4:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.3.0:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.3.0:beta1:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.3.0:beta3:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.3.0:rc1:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.3.0:rc2:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.3.0:rc3:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.3.1:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.3.2:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.3.3:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.3.4:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.3.5:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.4.0:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.4.0:beta1:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.4.0:beta2:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.4.0:rc1:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.4.0:rc2:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.4.0:rc3:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.4.1:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.4.2:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.4.3:*:*:*:*:*:*:*

Tenable Plugins

View all (18 total)

IDNameProductFamilySeverity
79961GLSA-201412-08 : Multiple packages, Multiple vulnerabilities fixed in 2010NessusGentoo Local Security Checks
critical
75547openSUSE Security Update : kdenetwork4 (openSUSE-SU-2010:1076-1)NessusSuSE Local Security Checks
medium
68260Oracle Linux 6 : kdenetwork (ELSA-2011-0465)NessusOracle Linux Local Security Checks
medium
53739openSUSE Security Update : kdenetwork4 (openSUSE-SU-2010:1076-1)NessusSuSE Local Security Checks
medium
53668openSUSE Security Update : kdenetwork3 (openSUSE-SU-2010:1085-1)NessusSuSE Local Security Checks
medium
53664openSUSE Security Update : kde4-kdnssd (openSUSE-SU-2010:1077-1)NessusSuSE Local Security Checks
medium
53564Fedora 15 : kdenetwork-4.6.2-2.fc15 (2011-5774)NessusFedora Local Security Checks
medium
53526RHEL 6 : kdenetwork (RHSA-2011:0465)NessusRed Hat Local Security Checks
medium
53508Fedora 13 : kdenetwork-4.5.5-2.fc13 (2011-5211)NessusFedora Local Security Checks
medium
51364SuSE 10 Security Update : kdenetwork (ZYPP Patch Number 7245)NessusSuSE Local Security Checks
medium
51199SuSE 11 / 11.1 Security Update : kdenetwork (SAT Patch Numbers 3563 / 3564)NessusSuSE Local Security Checks
medium
50847Fedora 12 : kdenetwork-4.4.5-4.fc12 (2010-18029)NessusFedora Local Security Checks
medium
47504Fedora 13 : kde-l10n-4.4.3-1.fc13 / kdeaccessibility-4.4.3-1.fc13.1 / kdeadmin-4.4.3-1.fc13.1 / etc (2010-8577)NessusFedora Local Security Checks
medium
47499Fedora 11 : kde-l10n-4.4.3-1.fc11 / kdeaccessibility-4.4.3-1.fc11.1 / kdeadmin-4.4.3-1.fc11.1 / etc (2010-8547)NessusFedora Local Security Checks
medium
47498Fedora 12 : kde-l10n-4.4.3-1.fc12 / kdeaccessibility-4.4.3-1.fc12.1 / kdeadmin-4.4.3-1.fc12.1 / etc (2010-8544)NessusFedora Local Security Checks
medium
46664Mandriva Linux Security Advisory : kdenetwork4 (MDVSA-2010:098)NessusMandriva Local Security Checks
medium
5539Konqueror < 4.4.3 Multiple VulnerabilitiesNessus Network MonitorWeb Clients
medium
46336Ubuntu 9.04 / 9.10 / 10.04 LTS : kdenetwork vulnerabilities (USN-938-1)NessusUbuntu Local Security Checks
medium