search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Konqueror fails to restrict access to Java classes

Vulnerability Note VU#420222

Original Release Date: 2005-01-05 | Last Revised: 2005-01-14

Overview

The Konqueror web browser may allow Java applets and JavaScripts to bypass the Java security settings and access restricted Java classes. Exploitation may allow a remote attacker to read and write arbitrary files on a vulnerable system.

Description

Konqueror is a web browser and file manager for the K Desktop Environment (KDE). A flaw in Konqueror may allow Java applets and JavaScripts to bypass the Java security settings and access restricted Java classes. Once the security restrictions are bypassed, the malicious applet or script may be able to access and manipulate system resources.

For more information on the Java security model see Sun's Java documentation, particularly the Applet Security FAQ referenced above. Microsoft provides similar documentation in its Java Security Overview and a corresponding FAQ.

Note that Java must be enabled in Konqueror to exploit this vulnerability with a Java applet. For exploitation via JavaScript, active scripting must be enabled.

Impact

By enticing a user to view and execute a malicious Java applet or JavaScript , a remote attacker may be able to read and write arbitrary files with the privileges of the browser process.

Solution

Upgrade


Update to Konqueror version 3.3.2.

Apply Patch

A patch for Konqueror 3.2.3 is available to correct this issue.

Disable Active Scripting and Java

At a minimum, disable Active scripting and Java within the web browser. Instructions for disabling Active scripting and Java can be found in the CERT/CC Malicious Web Scripts FAQ.

Vendor Information

420222
 

KDE Desktop Environment Project Unknown

Updated:  December 21, 2004

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

US-CERT has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was publicly reported by Waldo Bastian.

This document was written by Jeff Gennari.

Other Information

CVE IDs: CVE-2004-1145
Severity Metric: 3.90
Date Public: 2004-12-20
Date First Published: 2005-01-05
Date Last Updated: 2005-01-14 14:40 UTC
Document Revision: 49

Sponsored by CISA.