USN-436-2: KTorrent vulnerability
18 May 2007
USN-436-1 fixed a vulnerability in KTorrent. The original fix for path
traversal was incomplete, allowing for alternate vectors of attack.
This update solves the problem.
Original advisory details:
Bryan Burns of Juniper Networks discovered that KTorrent did not
correctly validate the destination file paths nor the HAVE statements
sent by torrent peers. A malicious remote peer could send specially
crafted messages to overwrite files or execute arbitrary code with user
The problem can be corrected by updating your system to the following package versions:
After a standard system upgrade you need to restart KTorrent to effect
the necessary changes.