First published: Wed May 12 2010(Updated: )
Secunia Research reported a flaw in KDE KGet that can be used by a malicious attacker to potentially compromise a user's system. The "name" attribute of the "file" element in metalink files is not properly sanitized before being used to download files. If a user were tricked into downloading a specially crafted metalink file, it could be used to download files to directories outside of the intended download directory via directory traversal flaws. KGet will start to download files in the background even before a user confirms whether or not they want the particular file downloaded, which could lead to KGet silently overwriting existing files with the same name. This flaw has been assigned the name <a href="https://access.redhat.com/security/cve/CVE-2010-1000">CVE-2010-1000</a>. It also only affects KGet in KDE 4.x and does not affect earlier versions. Only Red Hat Enterprise Linux 6 and Fedora would be affected.
Affected Software | Affected Version | How to fix |
---|---|---|
Krzysztof Kozlowski Konwert | >=4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-591631 is considered high due to the potential for remote compromise of a user's system.
To fix REDHAT-BUG-591631, ensure that you update KDE KGet to a patched version that sanitizes the 'name' attribute properly.
KDE KGet version 4.0 and above is affected by REDHAT-BUG-591631.
The vulnerability in REDHAT-BUG-591631 involves improper sanitization of the 'name' attribute in metalink files.
Yes, exploitation of REDHAT-BUG-591631 could potentially allow a malicious attacker to compromise and access sensitive user data.