Vulnerability Name: | CVE-2006-0019 (CCN-24242) | ||||||||||||||||||||
Assigned: | 2005-12-20 | ||||||||||||||||||||
Published: | 2006-01-19 | ||||||||||||||||||||
Updated: | 2018-10-19 | ||||||||||||||||||||
Summary: | Heap-based buffer overflow in the encodeURI and decodeURI functions in the kjs JavaScript interpreter engine in KDE 3.2.0 through 3.5.0 allows remote attackers to execute arbitrary code via a crafted, UTF-8 encoded URI. | ||||||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||
References: | Source: CONFIRM Type: Patch ftp://ftp.kde.org/pub/kde/security_patches/post-3.4.3-kdelibs-kjs.diff Source: MITRE Type: CNA CVE-2006-0019 Source: CCN Type: RHSA-2006-0184 kdelibs security update Source: CCN Type: SA18500 KDE kjs UTF-8 Encoded URI Buffer Overflow Vulnerability Source: SECUNIA Type: Patch, Vendor Advisory 18500 Source: SECUNIA Type: Vendor Advisory 18540 Source: SECUNIA Type: UNKNOWN 18552 Source: SECUNIA Type: UNKNOWN 18559 Source: SECUNIA Type: Vendor Advisory 18561 Source: SECUNIA Type: UNKNOWN 18570 Source: SECUNIA Type: UNKNOWN 18583 Source: SECUNIA Type: UNKNOWN 18899 Source: SREASON Type: UNKNOWN 364 Source: CCN Type: SECTRACK ID: 1015512 KDE kjs Engine Buffer Overflow Lets Remote Users Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN 1015512 Source: SLACKWARE Type: UNKNOWN SSA:2006-045-05 Source: CCN Type: ASA-2006-020 kdelibs security update (RHSA-2006-0184) Source: DEBIAN Type: Vendor Advisory DSA-948 Source: DEBIAN Type: DSA-948 kdelibs -- buffer overflow Source: CCN Type: GLSA-200601-11 KDE kjs: URI heap overflow vulnerability Source: GENTOO Type: UNKNOWN GLSA-200601-11 Source: CCN Type: KDE Security Advisory 20060119-1 kjs encodeuri/decodeuri heap overflow vulnerability Source: CONFIRM Type: Patch, Vendor Advisory http://www.kde.org/info/security/advisory-20060119-1.txt Source: MANDRIVA Type: UNKNOWN MDKSA-2006:019 Source: OSVDB Type: UNKNOWN 22659 Source: CCN Type: OSVDB ID: 22659 KDE kjs UTF-8 Encoded URI Processing Overflow Source: REDHAT Type: Vendor Advisory RHSA-2006:0184 Source: BUGTRAQ Type: UNKNOWN 20060119 [KDE Security Advisory] kjs encodeuri/decodeuri heap overflow Source: SUSE Type: UNKNOWN SUSE-SA:2006:003 Source: FEDORA Type: UNKNOWN FLSA:178606 Source: BID Type: UNKNOWN 16325 Source: CCN Type: BID-16325 KDE KJS Encodeuri / Decodeuri Remote Heap Overflow Vulnerability Source: CCN Type: USN-245-1 KDE library vulnerability Source: UBUNTU Type: UNKNOWN USN-245-1 Source: VUPEN Type: UNKNOWN ADV-2006-0265 Source: XF Type: UNKNOWN kde-kjs-bo(24242) Source: XF Type: UNKNOWN kde-kjs-bo(24242) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:11858 Source: SUSE Type: SUSE-SA:2006:003 kdelibs3/javascript buffer overflow | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Denotes that component is vulnerable | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |