Advertisement






kjs encodeuri/decodeuri heap overflow

CVE Category Price Severity
CVE-2006-0019 CWE-XXX $5000 Critical
Author Risk Exploitation Type Date
ExploitMaster Critical Remote 2006-01-28
CPE
cpe:cpe:/a:javascript:encodeuri-decodeuri
CVSS EPSS EPSSP
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2006010051

Below is a copy:

KDE Security Advisory: kjs encodeuri/decodeuri heap overflow vulnerability
Original Release Date: 2006-01-19
URL: http://www.kde.org/info/security/advisory-20060119-1.txt

0. References
        CVE-2006-0019

1. Systems affected:

KDE 3.2.0 up to including KDE 3.5.0

2. Overview:

Maksim Orlovich discovered an incorrect bounds check in kjs,
        the JavaScript interpreter engine used by Konqueror and other
        parts of KDE, that allows a heap based buffer overflow
        when decoding specially crafted UTF-8 encoded URI sequences.

3. Impact:

Remotely supplied Javascript code can perform a heap overflow
        and crash the web browser or execute arbitrary code.

4. Solution:

Source code patches have been made available which fix these
        vulnerabilities. Contact your OS vendor / binary package provider
        for information about how to obtain updated binary packages.

5. Patch:

Patch for KDE 3.4.0 - 3.5.0 is available from 
        ftp://ftp.kde.org/pub/kde/security_patches :

ecc0ec13ce3b06e94e35aa8e937e02bf  post-3.4.3-kdelibs-kjs.diff

Patch for KDE 3.2.0 - 3.3.2 is available from 
        ftp://ftp.kde.org/pub/kde/security_patches :

9bca9b44ca2d84e3b2f85ffb5d30e047  post-3.2.3-kdelibs-kjs.diff

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQBD0A2SvsXr+iuy1UoRAmXHAKCws5OgDiteQti4XNibfE92cuLrdwCgkD29
5Y047yDX048bFKmWpg7NFNY=
=wufg
-----END PGP SIGNATURE-----

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum