First published: Tue Jul 26 2011(Updated: )
A path traversal flaw was found in the way Ark, the tool for managing various archive formats within the KDE environment, processed certain Zip archives. A remote attacker could provide a specially-crafted Zip archive, which once opened in the Ark GUI frontend would lead to arbitrary file being opened or, potentially, if the local victim provided correct user credentials could allow that file to be removed. References: [1] <a href="http://www.openwall.com/lists/oss-security/2011/07/25/9">http://www.openwall.com/lists/oss-security/2011/07/25/9</a> [2] <a href="https://bugzilla.novell.com/show_bug.cgi?id=708268">https://bugzilla.novell.com/show_bug.cgi?id=708268</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Kde Kde Sc | <=4.7.4 | |
Kde Kde Sc | =4.7.0 | |
Kde Kde Sc | =4.7.3 | |
Kde Kde Sc | =4.7.1 | |
Kde Kde Sc | =4.7.2 | |
KDE Ark | <=2.17 | |
Canonical Ubuntu Linux | =10.10 | |
Canonical Ubuntu Linux | =11.04 | |
Canonical Ubuntu Linux | =11.10 | |
openSUSE openSUSE | =11.4 | |
Canonical Ubuntu Linux | =10.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.