Skip to main content

KDEMultiple Vulnerabilities

Last Update Date: 28 Jan 2011 Release Date: 29 Jun 2009 5264 Views

RISK: Medium Risk

Some vulnerabilities have been identified in KDE, which can be exploited by malicious people to compromise a user's system.

1. A vulnerability is caused due to a boundary error when processing SVGList objects. This can be exploited to trigger a memory corruption when visiting a malicious web page.

2. A vulnerability is caused due to a use-after-free error when processing certain SVG images, which can be exploited to execute arbitrary code via specially crafted SVG images.

3. A vulnerability is caused due to an error when executing JavaScript code which sets a certain property of the "head" HTML tag. This can be exploited to free child elements of the HTML tag and subsequently reference the freed memory when an HTML error is encountered.

4. An error exists within the processing of a certain CSS attribute. This can be exploited to cause a memory corruption when visiting a malicious web page.

5. An integer overflow exists within the JavaScript garbage collector, which can be exploited to exploited when visiting a malicious website.


Impact

  • Denial of Service
  • Remote Code Execution

System / Technologies affected

  • KDE 3.x

Solutions

Note: It is not aware of any vendor-supplied patch.

Workaround:

Browse trusted websites only.


Vulnerability Identifier

  • No CVE information is available

Source


Related Link