CVE-2011-1586

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Directory traversal vulnerability in the KGetMetalink::File::isValidNameAttr function in ui/metalinkcreator/metalinker.cpp in KGet in KDE SC 4.6.2 and earlier allows remote attackers to create arbitrary files via a .. (dot dot) in the name attribute of a file element in a metalink file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-1000.

References

http://openwall.com/lists/oss-security/2011/04/15/9

http://secunia.com/advisories/44124

http://secunia.com/advisories/44329

http://websvn.kde.org/branches/KDE/4.4/kdenetwork/kget/ui/metalinkcreator/metalinker.cpp?r1=1227468&r2=1227467&pathrev=1227468

http://websvn.kde.org/branches/KDE/4.5/kdenetwork/kget/ui/metalinkcreator/metalinker.cpp?r1=1227469&r2=1227468&pathrev=1227469

http://websvn.kde.org/branches/KDE/4.6/kdenetwork/kget/ui/metalinkcreator/metalinker.cpp?r1=1227471&r2=1227470&pathrev=1227471

http://www.mandriva.com/security/advisories?name=MDVSA-2011:081

http://www.redhat.com/support/errata/RHSA-2011-0465.html

http://www.ubuntu.com/usn/usn-1114-1/

http://www.vupen.com/english/advisories/2011/1019

http://www.vupen.com/english/advisories/2011/1021

http://www.vupen.com/english/advisories/2011/1135

https://bugzilla.redhat.com/show_bug.cgi?id=697042

https://exchange.xforce.ibmcloud.com/vulnerabilities/66826

https://launchpad.net/bugs/757526

Details

Source: MITRE

Published: 2011-04-27

Updated: 2017-08-17

Type: CWE-22

Risk Information

CVSS v2

Base Score: 5.8

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:P

Impact Score: 4.9

Exploitability Score: 8.6

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:kde:kde_sc:2.2.0:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:3.5.10:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.0.0:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.0.0:alpha1:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.0.0:alpha2:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.0.0:beta1:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.0.0:beta2:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.0.0:beta3:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.0.0:beta4:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.0.0:rc1:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.0.0:rc2:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.0.1:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.0.2:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.0.3:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.0.4:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.0.5:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.1.0:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.1.0:alpha1:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.1.0:beta1:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.1.0:beta2:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.1.0:rc:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.1.1:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.1.2:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.1.3:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.1.4:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.1.80:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.1.85:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.1.96:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.2:beta2:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.2:rc:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.2.0:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.2.1:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.2.2:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.2.3:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.2.4:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.3.0:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.3.0:beta1:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.3.0:beta3:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.3.0:rc1:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.3.0:rc2:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.3.0:rc3:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.3.1:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.3.2:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.3.3:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.3.4:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.3.5:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.4.0:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.4.0:beta1:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.4.0:beta2:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.4.0:rc1:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.4.0:rc2:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.4.0:rc3:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.4.1:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.4.2:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.4.3:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.4.4:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.4.5:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.5.0:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.5.1:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.5.2:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.5.3:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.5.4:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.5.5:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.6:beta1:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.6:beta2:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.6:rc1:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.6:rc2:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.6.0:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:4.6.1:*:*:*:*:*:*:*

cpe:2.3:a:kde:kde_sc:*:*:*:*:*:*:*:* versions up to 4.6.2 (inclusive)

Tenable Plugins

View all (5 total)

IDNameProductFamilySeverity
68260Oracle Linux 6 : kdenetwork (ELSA-2011-0465)NessusOracle Linux Local Security Checks
medium
61024Scientific Linux Security Update : kdenetwork on SL6.x i386/x86_64NessusScientific Linux Local Security Checks
medium
55072Ubuntu 9.10 / 10.04 LTS / 10.10 : kdenetwork vulnerability (USN-1114-1)NessusUbuntu Local Security Checks
medium
53628Mandriva Linux Security Advisory : kdenetwork4 (MDVSA-2011:081)NessusMandriva Local Security Checks
medium
53526RHEL 6 : kdenetwork (RHSA-2011:0465)NessusRed Hat Local Security Checks
medium