CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
EPSS
Percentile
78.1%
The Konqueror web browser may allow Java applets and JavaScripts to bypass the Java security settings and access restricted Java classes. Exploitation may allow a remote attacker to read and write arbitrary files on a vulnerable system.
Konqueror is a web browser and file manager for the K Desktop Environment (KDE). A flaw in Konqueror may allow Java applets and JavaScripts to bypass the Java security settings and access restricted Java classes. Once the security restrictions are bypassed, the malicious applet or script may be able to access and manipulate system resources.
For more information on the Java security model see Sun’s Java documentation, particularly the Applet Security FAQ referenced above. Microsoft provides similar documentation in its Java Security Overview and a corresponding FAQ.
Note that Java must be enabled in Konqueror to exploit this vulnerability with a Java applet. For exploitation via JavaScript, active scripting must be enabled.
By enticing a user to view and execute a malicious Java applet or JavaScript , a remote attacker may be able to read and write arbitrary files with the privileges of the browser process.
Upgrade
Update to Konqueror version 3.3.2._
_
Apply Patch
A patch for Konqueror 3.2.3 is available to correct this issue._
_
Disable Active Scripting and Java
At a minimum, disable Active scripting and Java within the web browser. Instructions for disabling Active scripting and Java can be found in the CERT/CC Malicious Web Scripts FAQ.
420222
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: December 21, 2004
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23420222 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This vulnerability was publicly reported by Waldo Bastian.
This document was written by Jeff Gennari.
CVE IDs: | CVE-2004-1145 |
---|---|
Severity Metric: | 3.90 Date Public: |