---------------------------------------------------------------------- Want a new IT Security job? Vacant positions at Secunia: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: KDE kdelibs PCX Image Buffer Overflow Vulnerability SECUNIA ADVISORY ID: SA14908 VERIFY ADVISORY: http://secunia.com/advisories/14908/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote SOFTWARE: KDE 3.x http://secunia.com/product/219/ DESCRIPTION: Bruno Rohee has reported a vulnerability in KDE kdelibs, which potentially can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to an error in the kimgio component when processing PCX image files. This may be exploited via a specially crafted image file to execute arbitrary code via an application linked against the vulnerable library. The vulnerability has been reported in KDE 3.4.0. Other version may also be affected. SOLUTION: Do not open untrusted images in applications linked against the vulnerable library. PROVIDED AND/OR DISCOVERED BY: Bruno Rohee ORIGINAL ADVISORY: KDE bug report: http://bugs.kde.org/show_bug.cgi?id=102328 SUSE advisory: http://www.novell.com/linux/security/advisories/2005_22_kdelibs3.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------