Vulnerability Details : CVE-2011-1586
Directory traversal vulnerability in the KGetMetalink::File::isValidNameAttr function in ui/metalinkcreator/metalinker.cpp in KGet in KDE SC 4.6.2 and earlier allows remote attackers to create arbitrary files via a .. (dot dot) in the name attribute of a file element in a metalink file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-1000.
Vulnerability category: Directory traversal
Products affected by CVE-2011-1586
- cpe:2.3:a:kde:kde_sc:*:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:3.5.10:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.3.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.3.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.4.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.4.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.1.80:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.1.85:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.0.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.0.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.3.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.3.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.4.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.0.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.0.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.0.0:beta4:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.3.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.2:rc:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.0.0:alpha2:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.1.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.1.0:rc:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.4.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.4.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.1.96:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.2:beta2:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.0.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.0.0:alpha1:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.1.0:alpha1:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.1.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.6:rc1:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.6:rc2:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.6:beta1:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.6:beta2:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:kde:kde_sc:4.5.3:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-1586
0.49%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 76 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-1586
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.8
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:P |
8.6
|
4.9
|
NIST |
CWE ids for CVE-2011-1586
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-1586
-
http://websvn.kde.org/branches/KDE/4.4/kdenetwork/kget/ui/metalinkcreator/metalinker.cpp?r1=1227468&r2=1227467&pathrev=1227468
[KDE] Diff of /branches/KDE/4.4/kdenetwork/kget/ui/metalinkcreator/metalinker.cppPatch
-
http://www.redhat.com/support/errata/RHSA-2011-0465.html
Support
-
http://openwall.com/lists/oss-security/2011/04/15/9
oss-security - Re: CVE Request: incomplete fix for CVE-2010-1000 in KDE network
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/66826
KDE KGet directory traversal CVE-2011-1586 Vulnerability Report
-
http://www.mandriva.com/security/advisories?name=MDVSA-2011:081
mandriva.com
-
https://launchpad.net/bugs/757526
Bug #757526 “Updated fix for CVE-2010-1000” : Bugs : kdenetwork package : Ubuntu
-
http://www.vupen.com/english/advisories/2011/1021
Webmail | OVH- OVHVendor Advisory
-
http://www.vupen.com/english/advisories/2011/1019
Webmail | OVH- OVHVendor Advisory
-
http://www.vupen.com/english/advisories/2011/1135
Webmail | OVH- OVH
-
http://websvn.kde.org/branches/KDE/4.5/kdenetwork/kget/ui/metalinkcreator/metalinker.cpp?r1=1227469&r2=1227468&pathrev=1227469
[KDE] Diff of /branches/KDE/4.5/kdenetwork/kget/ui/metalinkcreator/metalinker.cpp
-
http://www.ubuntu.com/usn/usn-1114-1/
USN-1114-1: KDENetwork vulnerability | Ubuntu security notices
-
http://websvn.kde.org/branches/KDE/4.6/kdenetwork/kget/ui/metalinkcreator/metalinker.cpp?r1=1227471&r2=1227470&pathrev=1227471
[KDE] Diff of /branches/KDE/4.6/kdenetwork/kget/ui/metalinkcreator/metalinker.cppPatch
-
https://bugzilla.redhat.com/show_bug.cgi?id=697042
697042 – (CVE-2011-1586) CVE-2011-1586 kdenetwork: incomplete fix for CVE-2010-1000
Jump to