SB2016080205 - Path traversal in KDE Frameworks
Published: August 2, 2016 Updated: August 19, 2019
Security Bulletin ID
SB2016080205
Severity
Medium
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Remote access
Highest impact
Data manipulation
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Path traversal (CVE-ID: CVE-2016-6232)
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in KArchive before 5.24, as used in KDE Frameworks. A remote attacker can trick the victim to open a specially crafted archive and data write to arbitrary files via a ./ (dot dot slash) in a filename, related to KNewsstuff downloads.
Remediation
Install update from vendor's website.
References
- http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00000.html
- http://www.debian.org/security/2016/dsa-3643
- http://www.openwall.com/lists/oss-security/2016/07/16/2
- http://www.openwall.com/lists/oss-security/2016/07/16/3
- http://www.ubuntu.com/usn/USN-3042-1
- https://quickgit.kde.org/?p=karchive.git&a=commit&h=0cb243f64eef45565741b27364cece7d5c349c37
- https://www.kde.org/info/security/advisory-20160724-1.txt