Medium Nessus Plugin ID 18014
SynopsisThe remote host is missing a vendor-supplied security patch
DescriptionThe remote host is missing the patch for the advisory SUSE-SA:2005:022 (kdelibs3).
Several vulnerabilities have been identified and fixed in the KDE desktop environment.
- A buffer overflow via specially crafted PCX pictures was fixed.
This could lead to a remote attacker being able to execute code as the user opening or viewing a PCX images. This PCX image could have been embedded within a web page or Email.
This affects SUSE Linux 9.1 up to 9.3, SUSE Linux Enterprise Server 9 and Novell Linux Desktop 9.
- The IDN domain name cloaking problem was fixed.
A remote website could disguise its name as another potentially trusted site by using a extension originally meant for non-ASCII domain names by using 'homographs' which look exactly like other letters.
The fix used by KDE is only use homographs for trusted domains.
It is disabled by default for the .net, .com and .org domains.
This issue exists in SUSE Linux 9.1 and 9.2, SUSE Linux Enterprise Server 9 and Novell Linux Desktop 9. It has been assigned the Mitre CVE ID CVE-2005-0233.
- A denial of service attack against the DCOP service was fixed.
A local user could cause another users KDE session to visible hang by writing bad data to the world-writable DCOP socket. The socket has been made writable only for the user itself.
This was found by Sebastian Krahmer of SUSE Security.
This affects all SUSE Linux versions, except SUSE Linux 9.3.
Updates for SUSE Linux up to 9.0 and SUSE Linux Enterprise Server 8 are not included for this minor issue. They will be included should a later security update for different issues be necessary.
This is tracked by the Mitre CVE ID CVE-2005-0396.
Additionally following bug was fixed:
- A possible race in the DNS resolver causing unresolved hosts in rare cases was fixed. This only affected SUSE Linux 9.3.