kdenetwork is vulnerable to directory traversal. The vulnerability exists as a flaw was found in the way KGet, a download manager, handled the “file” element in Metalink files. An attacker could use this flaw to create a specially-crafted Metalink file that, when opened, would cause KGet to overwrite arbitrary files accessible to the user running KGet.
openwall.com/lists/oss-security/2011/04/15/9
secunia.com/advisories/44124
secunia.com/advisories/44329
websvn.kde.org/branches/KDE/4.4/kdenetwork/kget/ui/metalinkcreator/metalinker.cpp?r1=1227468&r2=1227467&pathrev=1227468
websvn.kde.org/branches/KDE/4.5/kdenetwork/kget/ui/metalinkcreator/metalinker.cpp?r1=1227469&r2=1227468&pathrev=1227469
websvn.kde.org/branches/KDE/4.6/kdenetwork/kget/ui/metalinkcreator/metalinker.cpp?r1=1227471&r2=1227470&pathrev=1227471
www.mandriva.com/security/advisories?name=MDVSA-2011:081
www.redhat.com/support/errata/RHSA-2011-0465.html
www.ubuntu.com/usn/usn-1114-1/
www.vupen.com/english/advisories/2011/1019
www.vupen.com/english/advisories/2011/1021
www.vupen.com/english/advisories/2011/1135
access.redhat.com/errata/RHSA-2011:0465
access.redhat.com/security/cve/CVE-2011-1586
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=697042
exchange.xforce.ibmcloud.com/vulnerabilities/66826
launchpad.net/bugs/757526