KDE Project Security Advisory: ktnef: Directory Traversal
Bug #1668552 reported by
Philip Muškovac
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
kdepim (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
Trusty |
Incomplete
|
Undecided
|
Unassigned | ||
ktnef (Ubuntu) |
Fix Released
|
High
|
Kubuntu Developers | ||
Xenial |
Fix Released
|
High
|
Unassigned | ||
Yakkety |
Fix Released
|
High
|
Unassigned |
Bug Description
KDE Project Security Advisory
=======
Title: ktnef: Directory Traversal
Risk Rating: Medium
CVE: TBC
Versions: ktnef <= 5.4.2 (KDE Applications 16.12.2)
Date: 27 February 2017
Overview
========
A directory traversal issue was found in ktnef which can
be exploited by tricking a user into opening a malicious winmail.dat file.
The issue allows to write files with the permission of the user opening
the winmail.dat file during extraction.
Solution
========
Update to ktnef >= 5.4.3 (KDE Applications 16.12.3) (when released)
Or apply the following patch:
https:/
tags: | added: kubuntu |
Changed in kdepim (Ubuntu): | |
status: | New → Invalid |
no longer affects: | kdepim (Ubuntu Xenial) |
no longer affects: | kdepim (Ubuntu Yakkety) |
no longer affects: | ktnef (Ubuntu Trusty) |
Changed in ktnef (Ubuntu Xenial): | |
importance: | Undecided → High |
Changed in ktnef (Ubuntu Yakkety): | |
importance: | Undecided → High |
Changed in kdepim (Ubuntu Trusty): | |
status: | New → Incomplete |
To post a comment you must log in.
debdiff for yakkety is included in the attachment.