6.4 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:P/A:P
10 High
AI Score
Confidence
High
0.008 Low
EPSS
Percentile
82.1%
It was discovered that KGet did not properly perform input validation when
processing metalink files. If a user were tricked into opening a crafted
metalink file, a remote attacker could overwrite files via directory
traversal, which could eventually lead to arbitrary code execution.
(CVE-2010-1000)
It was discovered that KGet would not always wait for user confirmation
when downloading metalink files. If a user selected a file to download
but did not confirm or cancel the download, KGet would proceed with the
download, overwriting any file with the same name. This issue only
affected Ubuntu 10.04 LTS. (CVE-2010-1511)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 9.10 | noarch | kget | < 4:4.3.2-0ubuntu4.1 | UNKNOWN |
Ubuntu | 9.10 | noarch | kde-zeroconf | < 4:4.3.2-0ubuntu4.1 | UNKNOWN |
Ubuntu | 9.10 | noarch | kdenetwork-dbg | < 4:4.3.2-0ubuntu4.1 | UNKNOWN |
Ubuntu | 9.10 | noarch | kdenetwork-filesharing | < 4:4.3.2-0ubuntu4.1 | UNKNOWN |
Ubuntu | 9.10 | noarch | kopete | < 4:4.3.2-0ubuntu4.1 | UNKNOWN |
Ubuntu | 9.10 | noarch | kppp | < 4:4.3.2-0ubuntu4.1 | UNKNOWN |
Ubuntu | 9.10 | noarch | krdc | < 4:4.3.2-0ubuntu4.1 | UNKNOWN |
Ubuntu | 9.10 | noarch | krfb | < 4:4.3.2-0ubuntu4.1 | UNKNOWN |
Ubuntu | 9.10 | noarch | libkopete-dev | < 4:4.3.2-0ubuntu4.1 | UNKNOWN |
Ubuntu | 9.10 | noarch | libkopete4 | < 4:4.3.2-0ubuntu4.1 | UNKNOWN |