First published: Tue Jul 26 2011(Updated: )
A path traversal flaw was found in the way Ark, the tool for managing various archive formats within the KDE environment, processed certain Zip archives. A remote attacker could provide a specially-crafted Zip archive, which once opened in the Ark GUI frontend would lead to arbitrary file being opened or, potentially, if the local victim provided correct user credentials could allow that file to be removed. References: [1] <a href="http://www.openwall.com/lists/oss-security/2011/07/25/9">http://www.openwall.com/lists/oss-security/2011/07/25/9</a> [2] <a href="https://bugzilla.novell.com/show_bug.cgi?id=708268">https://bugzilla.novell.com/show_bug.cgi?id=708268</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
KDE Ark | <=2.17 | |
KDE SC | <=4.7.4 | |
KDE SC | =4.7.0 | |
KDE SC | =4.7.1 | |
KDE SC | =4.7.2 | |
KDE SC | =4.7.3 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =10.10 | |
Ubuntu Linux | =11.04 | |
Ubuntu Linux | =11.10 | |
openSUSE | =11.4 | |
Ubuntu | =10.10 | |
Ubuntu | =11.04 | |
Ubuntu | =11.10 | |
Ubuntu | =10.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2725 is classified as a medium severity vulnerability due to the potential for arbitrary file access.
CVE-2011-2725 affects KDE SC versions up to 4.7.4, including specific versions 4.7.0 through 4.7.3.
To fix CVE-2011-2725, users should update their KDE SC to a fixed version beyond 4.7.4 or apply any available patches.
Yes, an attacker can exploit CVE-2011-2725 remotely by crafting a malicious Zip archive that, when opened, accesses arbitrary files.
CVE-2011-2725 primarily affects KDE Ark and various versions of KDE SC within the KDE environment.