summaryrefslogtreecommitdiff
blob: 16cccd0bc31a6ddfaf01369665ee26a6ba1b5965 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200703-10">
  <title>KHTML: Cross-site scripting (XSS) vulnerability</title>
  <synopsis>
    The KHTML component shipped with the KDE libraries is prone to a cross-site
    scripting (XSS) vulnerability.
  </synopsis>
  <product type="ebuild">kdelibs</product>
  <announced>2007-03-10</announced>
  <revised>2007-03-10: 01</revised>
  <bug>165606</bug>
  <access>remote</access>
  <affected>
    <package name="kde-base/kdelibs" auto="yes" arch="*">
      <unaffected range="ge">3.5.5-r8</unaffected>
      <vulnerable range="lt">3.5.5-r8</vulnerable>
    </package>
  </affected>
  <background>
    <p>
    KDE is a feature-rich graphical desktop environment for Linux and
    Unix-like Operating Systems. KHTML is the HTML interpreter used in
    Konqueror and other parts of KDE.
    </p>
  </background>
  <description>
    <p>
    The KHTML code allows for the execution of JavaScript code located
    inside the "Title" HTML element, a related issue to the Safari error
    found by Jose Avila.
    </p>
  </description>
  <impact type="low">
    <p>
    When viewing a HTML page that renders unsanitized attacker-supplied
    input in the page title, Konqueror and other parts of KDE will execute
    arbitrary JavaScript code contained in the page title, allowing for the
    theft of browser session data or cookies.
    </p>
  </impact>
  <workaround>
    <p>
    There is no known workaround at this time.
    </p>
  </workaround>
  <resolution>
    <p>
    All KDElibs users should upgrade to the latest version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose "&gt;=kde-base/kdelibs-3.5.5-r8"</code>
  </resolution>
  <references>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0537">CVE-2007-0537</uri>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0478">CVE-2007-0478</uri>
  </references>
  <metadata tag="submitter" timestamp="2007-02-27T16:04:07Z">
    falco
  </metadata>
  <metadata tag="bugReady" timestamp="2007-02-27T16:19:36Z">
    falco
  </metadata>
</glsa>