Obrir sessió
logo

DEFENSA DAVANT DE LES CIBERAMENACES

barra-separadora

Soporte de vulnerabilidades

Servicio de soporte de vulnerabilidadesAnálisis, notificación y seguimiento de aquellas vulnerabilidades más críticas, que impactan especialmente en las tecnologías empleadas en el sector público. El CCN-CERT trabajará en la recopilación y clasificación de las nuevas vulnerabilidades, realizando un análisis teórico y en laboratorio, cuando sea posible, de aquellas que por su criticidad lo requieran.

Se generarán documentos informativos o “abstracts” de dichas vulnerabilidades y se llevará a cabo un seguimiento de la evolución de la vulnerabilidad en Internet, alertando a los organismos ante cambios en la criticidad, aparición de parches, nuevas recomendaciones, constancia de explotaciones activas, etc.

Para inscribirse en este servicio o recibir más información, escribir al correo electrónico: soporte_acreditacion@ccn.cni.es

Abstracts:


Boletines de Vulnerabilidades


Vulnerabilidades en el manejo de URIs en KDE

Clasificación de la vulnerabilidad

Propiedad Valor
Nivel de Confianza Oficial
Impacto Integridad
Dificultad Principiante
Requerimientos del atacante Acceso remoto sin cuenta a un servicio estandar

Información sobre el sistema

Propiedad Valor
Fabricant afectat GNU/Linux
Software afectado KDE <=3.2.2

Descripción

Se ha descubierto una vulnerabilidad en la versión 3.2.2 y anteriores de KDE. La vulnerabilidad reside en los manejadores de URIs telnet, rlogin, ssh y mailto ya que no se chequea que el hostname proporcionado contenga el carácter "-" al principio. Esto podría provocar que se le pasaran opciones a los programas lanzados por los manejadores.

La explotación de esta vulnerabilidad podría permitir a un atacante remoto mediante URIs telnet especialmente diseñadas, que la víctima debe visitar, crear o truncar cualquier fichero siempre que la víctima tenga permisos de escritura.

Asimismo, un atacante remoto podría utilizar una URI mailto especialmente diseñada, que la víctima debe visitar, para que se ejecute el programa Kmail con el display redirigido a un host remoto bajo el control del atacante o bien para que este se ejecute con un archivo de configuración que el atacante especifique (dentro de la máquina víctima).

Solución

Si lo desea, aplique los mecanismos de actualización propios de su distribución, o bien baje las fuentes del software y compílelo usted mismo.


Actualización de software

KDE
KDE 3.0.5b - Parches
ftp://ftp.kde.org/pub/kde/security_patches/post-3.0.5b-kdelibs-kapplication.patch
ftp://ftp.kde.org/pub/kde/security_patches/post-3.0.5b-kdelibs-ktelnetservice.patch
KDE 3.1.5 - Parches
ftp://ftp.kde.org/pub/kde/security_patches/post-3.1.5-kdelibs-kapplication.patch
ftp://ftp.kde.org/pub/kde/security_patches/post-3.1.5-kdelibs-ktelnetservice.patch
KDE 3.2.2 - Parches
ftp://ftp.kde.org/pub/kde/security_patches/post-3.2.2-kdelibs-kapplication.patch
ftp://ftp.kde.org/pub/kde/security_patches/post-3.2.2-kdelibs-ktelnetservice.patch

Mandrake Linux

Mandrake Linux 9.2
i386
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/kdelibs-common-3.1.3-35.2.92mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/libkdecore4-3.1.3-35.2.92mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/libkdecore4-devel-3.1.3-35.2.92mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/SRPMS/kdelibs-3.1.3-35.2.92mdk.src.rpm
AMD64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/kdelibs-common-3.1.3-35.2.92mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/lib64kdecore4-3.1.3-35.2.92mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/lib64kdecore4-devel-3.1.3-35.2.92mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/SRPMS/kdelibs-3.1.3-35.2.92mdk.src.rpm

Mandrakelinux 10.0
i386
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kdelibs-common-3.2-36.2.100mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/libkdecore4-3.2-36.2.100mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/libkdecore4-devel-3.2-36.2.100mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/kdelibs-3.2-36.2.100mdk.src.rpm

Red Hat Linux

Red Hat Desktop (v. 3)
AMD64
kdelibs-3.1.3-6.4.x86_64.rpm
kdelibs-devel-3.1.3-6.4.x86_64.rpm
SRPMS
kdelibs-3.1.3-6.4.src.rpm
i386
kdelibs-3.1.3-6.4.i386.rpm
kdelibs-devel-3.1.3-6.4.i386.rpm
https://rhn.redhat.com/

Red Hat Enterprise Linux AS (v. 2.1)
SRPMS
kdelibs-2.2.2-11.src.rpm
i386
arts-2.2.2-11.i386.rpm
kdelibs-2.2.2-11.i386.rpm
kdelibs-devel-2.2.2-11.i386.rpm
kdelibs-sound-2.2.2-11.i386.rpm
kdelibs-sound-devel-2.2.2-11.i386.rpm
ia64
arts-2.2.2-11.ia64.rpm
kdelibs-2.2.2-11.ia64.rpm
kdelibs-devel-2.2.2-11.ia64.rpm
kdelibs-sound-2.2.2-11.ia64.rpm
kdelibs-sound-devel-2.2.2-11.ia64.rpm
https://rhn.redhat.com/

Red Hat Enterprise Linux AS (v. 3)
AMD64
kdelibs-3.1.3-6.4.x86_64.rpm
kdelibs-devel-3.1.3-6.4.x86_64.rpm
SRPMS
kdelibs-3.1.3-6.4.src.rpm
i386
kdelibs-3.1.3-6.4.i386.rpm
kdelibs-devel-3.1.3-6.4.i386.rpm
ia64
kdelibs-3.1.3-6.4.ia64.rpm
kdelibs-devel-3.1.3-6.4.ia64.rpm
ppc
kdelibs-3.1.3-6.4.ppc.rpm
kdelibs-devel-3.1.3-6.4.ppc.rpm
s390
kdelibs-3.1.3-6.4.s390.rpm
kdelibs-devel-3.1.3-6.4.s390.rpm
s390x
kdelibs-3.1.3-6.4.s390x.rpm
kdelibs-devel-3.1.3-6.4.s390x.rpm
https://rhn.redhat.com/

Red Hat Enterprise Linux ES (v. 2.1)
SRPMS
kdelibs-2.2.2-11.src.rpm
i386
arts-2.2.2-11.i386.rpm
kdelibs-2.2.2-11.i386.rpm
kdelibs-devel-2.2.2-11.i386.rpm
kdelibs-sound-2.2.2-11.i386.rpm
kdelibs-sound-devel-2.2.2-11.i386.rpm
https://rhn.redhat.com/

Red Hat Enterprise Linux ES (v. 3)
AMD64
kdelibs-3.1.3-6.4.x86_64.rpm
kdelibs-devel-3.1.3-6.4.x86_64.rpm
SRPMS
kdelibs-3.1.3-6.4.src.rpm
i386
kdelibs-3.1.3-6.4.i386.rpm
kdelibs-devel-3.1.3-6.4.i386.rpm
ia64
kdelibs-3.1.3-6.4.ia64.rpm
kdelibs-devel-3.1.3-6.4.ia64.rpm
https://rhn.redhat.com/

Red Hat Enterprise Linux WS (v. 2.1)
SRPMS
kdelibs-2.2.2-11.src.rpm
i386
arts-2.2.2-11.i386.rpm
kdelibs-2.2.2-11.i386.rpm
kdelibs-devel-2.2.2-11.i386.rpm
kdelibs-sound-2.2.2-11.i386.rpm
kdelibs-sound-devel-2.2.2-11.i386.rpm
https://rhn.redhat.com/

Red Hat Enterprise Linux WS (v. 3)
AMD64
kdelibs-3.1.3-6.4.x86_64.rpm
kdelibs-devel-3.1.3-6.4.x86_64.rpm
SRPMS
kdelibs-3.1.3-6.4.src.rpm
i386
kdelibs-3.1.3-6.4.i386.rpm
kdelibs-devel-3.1.3-6.4.i386.rpm
ia64
kdelibs-3.1.3-6.4.ia64.rpm
kdelibs-devel-3.1.3-6.4.ia64.rpm
https://rhn.redhat.com/

Red Hat Linux Advanced Workstation 2.1 Itanium Processor
SRPMS
kdelibs-2.2.2-11.src.rpm
ia64
arts-2.2.2-11.ia64.rpm
kdelibs-2.2.2-11.ia64.rpm
kdelibs-devel-2.2.2-11.ia64.rpm
kdelibs-sound-2.2.2-11.ia64.rpm
kdelibs-sound-devel-2.2.2-11.ia64.rpm
https://rhn.redhat.com/

SuSE Linux

SuSE-9.1
i386
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kdelibs3-3.2.1-44.10.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kdelibs3-3.2.1-44.10.i586.patch.rpm
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kdelibs3-3.2.1-44.10.src.rpm
Opteron x86_64
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kdelibs3-3.2.1-44.10.x86_64.rpm
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kdelibs3-3.2.1-44.10.x86_64.patch.rpm
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kdelibs3-3.2.1-44.10.src.rpm

SuSE-9.0
i386
ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/kdelibs3-3.1.4-51.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/kdelibs3-3.1.4-51.i586.patch.rpm
ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/src/kdelibs3-3.1.4-51.src.rpm
Opteron x86_64
ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/kdelibs3-3.1.4-51.x86_64.rpm
ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/kdelibs3-3.1.4-51.x86_64.patch.rpm
ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/src/kdelibs3-3.1.4-51.src.rpm

SuSE-8.2
i386
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/kdelibs3-3.1.1-139.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/kdelibs3-3.1.1-139.i586.patch.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/src/kdelibs3-3.1.1-139.src.rpm

SuSE-8.1
i386
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/kdelibs3-3.0.5-54.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/kdelibs3-3.0.5-54.i586.patch.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/src/kdelibs3-3.0.5-54.src.rpm

SuSE-8.0
i386
ftp://ftp.suse.com/pub/suse/i386/update/8.0/kde1/kdelibs3-3.0-120.i386.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.0/kde1/kdelibs3-3.0-120.i386.patch.rpm

Debian Linux

Debian Linux 3.0
Source
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs_2.2.2-13.woody.10.dsc
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs_2.2.2-13.woody.10.diff.gz
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs_2.2.2.orig.tar.gz
Paquetes independientes de arquitectura
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-doc_2.2.2-13.woody.10_all.deb
Alpha
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_alpha.deb
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_alpha.deb
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_alpha.deb
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_alpha.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_alpha.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_alpha.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_alpha.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_alpha.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_alpha.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_alpha.deb
ARM
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_arm.deb
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_arm.deb
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_arm.deb
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_arm.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_arm.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_arm.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_arm.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_arm.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_arm.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_arm.deb
Intel IA-32
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_i386.deb
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_i386.deb
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_i386.deb
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_i386.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_i386.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_i386.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_i386.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_i386.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_i386.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_i386.deb
Intel IA-64
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_ia64.deb
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_ia64.deb
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_ia64.deb
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_ia64.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_ia64.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_ia64.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_ia64.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_ia64.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_ia64.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_ia64.deb
HP Precision
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_hppa.deb
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_hppa.deb
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_hppa.deb
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_hppa.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_hppa.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_hppa.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_hppa.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_hppa.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_hppa.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_hppa.deb
Motorola 680x0
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_m68k.deb
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_m68k.deb
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_m68k.deb
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_m68k.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_m68k.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_m68k.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_m68k.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_m68k.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_m68k.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_m68k.deb
Big endian MIPS
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_mips.deb
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_mips.deb
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_mips.deb
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_mips.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_mips.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_mips.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_mips.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_mips.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_mips.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_mips.deb
Little endian MIPS
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_mipsel.deb
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_mipsel.deb
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_mipsel.deb
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_mipsel.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_mipsel.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_mipsel.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_mipsel.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_mipsel.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_mipsel.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_mipsel.deb
PowerPC
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_powerpc.deb
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_powerpc.deb
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_powerpc.deb
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_powerpc.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_powerpc.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_powerpc.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_powerpc.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_powerpc.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_powerpc.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_powerpc.deb
IBM S/390
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_s390.deb
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_s390.deb
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_s390.deb
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_s390.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_s390.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_s390.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_s390.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_s390.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_s390.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_s390.deb
Sun Sparc
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs-dev_2.2.2-13.woody.10_sparc.deb
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3_2.2.2-13.woody.10_sparc.deb
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-bin_2.2.2-13.woody.10_sparc.deb
http://security.debian.org/pool/updates/main/k/kdelibs/kdelibs3-cups_2.2.2-13.woody.10_sparc.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libarts_2.2.2-13.woody.10_sparc.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-alsa_2.2.2-13.woody.10_sparc.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libarts-dev_2.2.2-13.woody.10_sparc.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid_2.2.2-13.woody.10_sparc.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-alsa_2.2.2-13.woody.10_sparc.deb
http://security.debian.org/pool/updates/main/k/kdelibs/libkmid-dev_2.2.2-13.woody.10_sparc.deb

Identificadores estándar

Propiedad Valor
CVE CAN-2004-0411
BID NULL

Recursos adicionales

KDE Security Advisory
http://www.kde.org/info/security/advisory-20040517-1.txt

MandrakeSoft Security Advisory MDKSA-2004:047
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:047

Red Hat Security Advisory RHSA-2004:222-11
https://rhn.redhat.com/errata/RHSA-2004-222.html

SUSE Security Announcement SuSE-SA:2003:014
http://www.suse.de/de/security/2004_14_kdelibs.html

Debian Security Advisory DSA 518-1
http://lists.debian.org/debian-security-announce/debian-security-announce-2004/msg00119.html

Histórico de versiones

Versión Comentario Data
1.0 Aviso emitido 2004-05-18
1.1 Aviso emitido por Mandrake (MDKSA-2004:047). Aviso emitido por Red Hat (RHSA-2004:222-11) 2004-05-19
1.2 Aviso emitido por SuSE (SuSE-SA:2003:014) 2004-05-27
1.3 Aviso emitido por Debian (DSA 518-1) 2004-06-15
Tornar

Este sitio web utiliza cookies propias y de terceros para el correcto funcionamiento y visualización del sitio web por parte del usuario, así como la recogida de estadísticas. Si continúa navegando, consideramos que acepta su uso. Puede cambiar la configuración u obtener más información. Modificar configuración