USN-1114-1: KDENetwork vulnerability
18 April 2011
An attacker could overwrite files owned by the user if KGet opened a crafted metalink file.
Releases
Packages
- kdenetwork - networking applications for KDE 4
Details
It was discovered that KGet did not properly perform input validation when
processing metalink files. If a user were tricked into opening a crafted
metalink file, a remote attacker could overwrite files via directory
traversal, which could eventually lead to arbitrary code execution.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 9.10
Ubuntu 10.10
Ubuntu 10.04
After a standard system update you need to restart KGet to make all the
necessary changes.