Executive Summary
Summary | |
---|---|
Title | KTorrent vulnerabilities |
Informations | |||
---|---|---|---|
Name | USN-711-1 | First vendor Publication | 2009-01-26 |
Vendor | Ubuntu | Last vendor Modification | 2009-01-26 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects the following Ubuntu releases: Ubuntu 7.10 Ubuntu 8.04 LTS Ubuntu 8.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 7.10: Ubuntu 8.04 LTS: Ubuntu 8.10: After a standard system upgrade you need to restart KTorrent to effect the necessary changes. Details follow: It was discovered that KTorrent did not properly restrict access when using the web interface plugin. A remote attacker could use a crafted http request and upload arbitrary torrent files to trigger the start of downloads and seeding. (CVE-2008-5905) It was discovered that KTorrent did not properly handle certain parameters when using the web interface plugin. A remote attacker could use crafted http requests to execute arbitrary PHP code. (CVE-2008-5906) |
Original Source
Url : http://www.ubuntu.com/usn/USN-711-1 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-264 | Permissions, Privileges, and Access Controls |
50 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:13673 | |||
Oval ID: | oval:org.mitre.oval:def:13673 | ||
Title: | USN-711-1 -- ktorrent vulnerabilities | ||
Description: | It was discovered that KTorrent did not properly restrict access when using the web interface plugin. A remote attacker could use a crafted http request and upload arbitrary torrent files to trigger the start of downloads and seeding. It was discovered that KTorrent did not properly handle certain parameters when using the web interface plugin. A remote attacker could use crafted http requests to execute arbitrary PHP code | ||
Family: | unix | Class: | patch |
Reference(s): | USN-711-1 CVE-2008-5905 CVE-2008-5906 | Version: | 5 |
Platform(s): | Ubuntu 7.10 Ubuntu 8.10 Ubuntu 8.04 | Product(s): | ktorrent |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-03-02 | Name : Gentoo Security Advisory GLSA 200902-05 (ktorrent) File : nvt/glsa_200902_05.nasl |
2009-02-02 | Name : Ubuntu USN-710-1 (xine-lib) File : nvt/ubuntu_710_1.nasl |
2009-02-02 | Name : Ubuntu USN-711-1 (ktorrent) File : nvt/ubuntu_711_1.nasl |
2009-01-22 | Name : KTorrent PHP Code Injection And Security Bypass Vulnerability File : nvt/gb_ktorrent_sec_bypass_vuln.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
49357 | KTorrent Web Interface Plugin Multiple Variable Arbitrary PHP Code Injection |
49356 | KTorrent Web Interface Plugin Crafted POST Request Arbitrary Torrent File Upload |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2009-04-23 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-711-1.nasl - Type : ACT_GATHER_INFO |
2009-02-24 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200902-05.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 12:05:38 |
|