---------------------------------------------------------------------- Want a new IT Security job? Vacant positions at Secunia: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: KDE KMail User Interface Spoofing Vulnerability SECUNIA ADVISORY ID: SA14925 VERIFY ADVISORY: http://secunia.com/advisories/14925/ CRITICAL: Less critical IMPACT: Spoofing WHERE: >From remote SOFTWARE: KDE 3.x http://secunia.com/product/219/ DESCRIPTION: Noam Rathaus has discovered a vulnerability in KMail, which can be exploited by malicious people to conduct spoofing attacks. The vulnerability is caused due to an error where HTML code can overlay part of the user interface. This can e.g. be exploited to trick a user into believing a specially crafted mail is signed and coming from a trusted source. Successful exploitation requires that the option "Prefer HTML to plain text" is enabled (not default setting). The vulnerability has been confirmed in KMail 1.7.1 on KDE 3.3.1. KDE 3.3.2 is reportedly also affected. Other versions may also be affected. SOLUTION: Disable the "Prefer HTML to plain text" setting. PROVIDED AND/OR DISCOVERED BY: Noam Rathaus ORIGINAL ADVISORY: http://bugs.kde.org/show_bug.cgi?id=96020 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------