CVE-2010-1000
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
17/05/2010
Last modified:
11/04/2025
Description
Directory traversal vulnerability in KGet in KDE SC 4.0.0 through 4.4.3 allows remote attackers to create arbitrary files via directory traversal sequences in the name attribute of a file element in a metalink file.
Impact
Base Score 2.0
5.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:kde:kde_sc:4.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kde_sc:4.0.0:alpha1:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kde_sc:4.0.0:alpha2:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kde_sc:4.0.0:beta1:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kde_sc:4.0.0:beta2:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kde_sc:4.0.0:beta3:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kde_sc:4.0.0:beta4:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kde_sc:4.0.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kde_sc:4.0.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kde_sc:4.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kde_sc:4.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kde_sc:4.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kde_sc:4.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kde_sc:4.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kde_sc:4.1.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051692.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058580.html
- http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
- http://marc.info/?l=oss-security&m=127378789518426&w=2
- http://osvdb.org/64690
- http://secunia.com/advisories/39528
- http://secunia.com/advisories/39787
- http://secunia.com/advisories/42423
- http://secunia.com/secunia_research/2010-69/
- http://securitytracker.com/id?1023984=
- http://www.kde.org/info/security/advisory-20100513-1.txt
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A098
- http://www.securityfocus.com/archive/1/511281/100/0/threaded
- http://www.securityfocus.com/archive/1/511294/100/0/threaded
- http://www.securityfocus.com/bid/40141
- http://www.ubuntu.com/usn/USN-938-1
- http://www.vupen.com/english/advisories/2010/1142
- http://www.vupen.com/english/advisories/2010/1144
- http://www.vupen.com/english/advisories/2010/3096
- http://www.vupen.com/english/advisories/2011/1101
- https://exchange.xforce.ibmcloud.com/vulnerabilities/58628
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051692.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058580.html
- http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
- http://marc.info/?l=oss-security&m=127378789518426&w=2
- http://osvdb.org/64690
- http://secunia.com/advisories/39528
- http://secunia.com/advisories/39787
- http://secunia.com/advisories/42423
- http://secunia.com/secunia_research/2010-69/
- http://securitytracker.com/id?1023984=
- http://www.kde.org/info/security/advisory-20100513-1.txt
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A098
- http://www.securityfocus.com/archive/1/511281/100/0/threaded
- http://www.securityfocus.com/archive/1/511294/100/0/threaded
- http://www.securityfocus.com/bid/40141
- http://www.ubuntu.com/usn/USN-938-1
- http://www.vupen.com/english/advisories/2010/1142
- http://www.vupen.com/english/advisories/2010/1144
- http://www.vupen.com/english/advisories/2010/3096
- http://www.vupen.com/english/advisories/2011/1101
- https://exchange.xforce.ibmcloud.com/vulnerabilities/58628



