Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Debian Security Advisory DSA 293-1 (kdelibs)

Information

Severity

Severity

High

Family

Family

Debian Local Security Checks

CVSSv2 Base

CVSSv2 Base

7.5

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

16 years ago

Modified

Modified

6 years ago

Summary

The remote host is missing an update to kdelibs announced via advisory DSA 293-1.

Insight

Insight

The KDE team discoverd a vulnerability in the way KDE uses Ghostscript software for processing of PostScript (PS) and PDF files. An attacker could provide a malicious PostScript or PDF file via mail or websites that could lead to executing arbitrary commands under the privileges of the user viewing the file or when the browser generates a directory listing with thumbnails. For the stable distribution (woody) this problem has been fixed in version 2.2.2-13.woody.7 of kdelibs and associated packages. The old stable distribution (potato) is not affected since it does not contain KDE. For the unstable distribution (sid) this problem will be fixed soon. For the unofficial backport of KDE 3.1.1 to woody by Ralf Nolden on download.kde.org, this problem has been fixed in version 3.1.1-0woody3 of kdelibs. Using the normal backport line for apt-get you will get the update: deb http://download.kde.org/stable/latest/Debian stable main We recommend that you upgrade your kdelibs and associated packages.

Solution

Solution

https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20293-1

Common Vulnerabilities and Exposures (CVE)