CVE-2011-1586
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
27/04/2011
Last modified:
11/04/2025
Description
Directory traversal vulnerability in the KGetMetalink::File::isValidNameAttr function in ui/metalinkcreator/metalinker.cpp in KGet in KDE SC 4.6.2 and earlier allows remote attackers to create arbitrary files via a .. (dot dot) in the name attribute of a file element in a metalink file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-1000.
Impact
Base Score 2.0
5.80
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:kde:kde_sc:*:*:*:*:*:*:*:* | 4.6.2 (including) | |
cpe:2.3:a:kde:kde_sc:2.2.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:kde:kde_sc:3.5.10:*:*:*:*:*:*:* | ||
cpe:2.3:a:kde:kde_sc:4.0.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:kde:kde_sc:4.0.0:alpha1:*:*:*:*:*:* | ||
cpe:2.3:a:kde:kde_sc:4.0.0:alpha2:*:*:*:*:*:* | ||
cpe:2.3:a:kde:kde_sc:4.0.0:beta1:*:*:*:*:*:* | ||
cpe:2.3:a:kde:kde_sc:4.0.0:beta2:*:*:*:*:*:* | ||
cpe:2.3:a:kde:kde_sc:4.0.0:beta3:*:*:*:*:*:* | ||
cpe:2.3:a:kde:kde_sc:4.0.0:beta4:*:*:*:*:*:* | ||
cpe:2.3:a:kde:kde_sc:4.0.0:rc1:*:*:*:*:*:* | ||
cpe:2.3:a:kde:kde_sc:4.0.0:rc2:*:*:*:*:*:* | ||
cpe:2.3:a:kde:kde_sc:4.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:kde:kde_sc:4.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:kde:kde_sc:4.0.3:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://openwall.com/lists/oss-security/2011/04/15/9
- http://secunia.com/advisories/44124
- http://secunia.com/advisories/44329
- http://websvn.kde.org/branches/KDE/4.4/kdenetwork/kget/ui/metalinkcreator/metalinker.cpp?r1=1227468&r2=1227467&pathrev=1227468
- http://websvn.kde.org/branches/KDE/4.5/kdenetwork/kget/ui/metalinkcreator/metalinker.cpp?r1=1227469&r2=1227468&pathrev=1227469
- http://websvn.kde.org/branches/KDE/4.6/kdenetwork/kget/ui/metalinkcreator/metalinker.cpp?r1=1227471&r2=1227470&pathrev=1227471
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A081
- http://www.redhat.com/support/errata/RHSA-2011-0465.html
- http://www.ubuntu.com/usn/usn-1114-1/
- http://www.vupen.com/english/advisories/2011/1019
- http://www.vupen.com/english/advisories/2011/1021
- http://www.vupen.com/english/advisories/2011/1135
- https://bugzilla.redhat.com/show_bug.cgi?id=697042
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66826
- https://launchpad.net/bugs/757526
- http://openwall.com/lists/oss-security/2011/04/15/9
- http://secunia.com/advisories/44124
- http://secunia.com/advisories/44329
- http://websvn.kde.org/branches/KDE/4.4/kdenetwork/kget/ui/metalinkcreator/metalinker.cpp?r1=1227468&r2=1227467&pathrev=1227468
- http://websvn.kde.org/branches/KDE/4.5/kdenetwork/kget/ui/metalinkcreator/metalinker.cpp?r1=1227469&r2=1227468&pathrev=1227469
- http://websvn.kde.org/branches/KDE/4.6/kdenetwork/kget/ui/metalinkcreator/metalinker.cpp?r1=1227471&r2=1227470&pathrev=1227471
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A081
- http://www.redhat.com/support/errata/RHSA-2011-0465.html
- http://www.ubuntu.com/usn/usn-1114-1/
- http://www.vupen.com/english/advisories/2011/1019
- http://www.vupen.com/english/advisories/2011/1021
- http://www.vupen.com/english/advisories/2011/1135
- https://bugzilla.redhat.com/show_bug.cgi?id=697042
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66826
- https://launchpad.net/bugs/757526