Vulnerability Name:

CVE-2004-0411 (CCN-16163)

Assigned:2004-05-17
Published:2004-05-17
Updated:2022-02-28
Summary:The URI handlers in Konqueror for KDE 3.2.2 and earlier do not properly filter "-" characters that begin a hostname in a (1) telnet, (2) rlogin, (3) ssh, or (4) mailto URI, which allows remote attackers to manipulate the options that are passed to the associated programs, possibly to read arbitrary files or execute arbitrary code.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-20
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2004-0411

Source: CONECTIVA
Type: Broken Link
CLA-2004:843

Source: CCN
Type: Conectiva Linux Security Advisory CLSA-2004:843
kde

Source: BUGTRAQ
Type: Mailing List
20040517 KDE Security Advisory: URI Handler Vulnerabilities

Source: CCN
Type: RHSA-2004-222
kdelibs security update

Source: CCN
Type: SA11602
Multiple Browsers Telnet URI Handler File Manipulation Vulnerability

Source: SECUNIA
Type: Broken Link
11602

Source: GENTOO
Type: Third Party Advisory
GLSA-200405-11

Source: CCN
Type: CIAC Information Bulletin O-146
kdelibs Package Vulnerabilities

Source: CIAC
Type: Broken Link
O-146

Source: DEBIAN
Type: Third Party Advisory
DSA-518

Source: DEBIAN
Type: DSA-518
kdelibs -- unsanitised input

Source: CCN
Type: GLSA-200405-11
KDE URI Handler Vulnerabilities

Source: CCN
Type: KDE Security Advisory 2004-05-17
URI Handler Vulnerabilities

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www.kde.org/info/security/advisory-20040517-1.txt

Source: CCN
Type: GLSA 200405-11
KDE URI Handler Vulnerabilities

Source: SUSE
Type: Broken Link
SuSE-SA:2003:014

Source: OSVDB
Type: Broken Link
6107

Source: CCN
Type: OSVDB ID: 6107
Multiple Browser Telnet URI Handler File Manipulation

Source: REDHAT
Type: Broken Link
RHSA-2004:222

Source: FEDORA
Type: Broken Link, Third Party Advisory, VDB Entry
FEDORA-2004-121

Source: FEDORA
Type: Broken Link, Third Party Advisory, VDB Entry
FEDORA-2004-122

Source: BUGTRAQ
Type: Broken Link, Third Party Advisory, VDB Entry, Vendor Advisory
20040513 Opera Telnet URI Handler Vulnerability also applies to other browsers

Source: BID
Type: Broken Link, Third Party Advisory, VDB Entry
10358

Source: CCN
Type: BID-10358
KDE Multiple URI Handler Vulnerabilities

Source: CCN
Type: slackware-security Mailing List, Tue, 18 May 2004 00:08:28 -0700 (PDT)
kdelibs (SSA:2004-238-01)

Source: SLACKWARE
Type: Broken Link
SSA:2004-238

Source: XF
Type: Third Party Advisory, VDB Entry
kde-url-handler-gain-access(16163)

Source: XF
Type: UNKNOWN
kde-url-handler-gain-access(16163)

Source: OVAL
Type: Tool Signature
oval:org.mitre.oval:def:954

Source: SUSE
Type: SUSE-SA:2003:014
kdelibs: remote file creation

Vulnerable Configuration:Configuration 1:
  • cpe:/a:kde:konqueror:*:*:*:*:*:*:*:* (Version <= 3.2.2)

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20040411
    V
    CVE-2004-0411
    2015-11-16
    oval:org.mitre.oval:def:954
    V
    Konqueror URI Handler "-" Filter Vulnerability
    2007-04-25
    oval:org.debian:def:518
    V
    unsanitised input
    2004-06-14
    BACK
    kde konqueror *