Multiple vulnerabilities in KDE 2 and KDE 3.x through 3.0.5 do not quote certain parameters that are inserted into a shell command, which could allow remote attackers to execute arbitrary commands via (1) URLs, (2) filenames, or (3) e-mail addresses.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Kde | Kde | 2.0 (including) | 2.0 (including) |
Kde | Kde | 2.0.1 (including) | 2.0.1 (including) |
Kde | Kde | 2.1 (including) | 2.1 (including) |
Kde | Kde | 2.1.1 (including) | 2.1.1 (including) |
Kde | Kde | 2.1.2 (including) | 2.1.2 (including) |
Kde | Kde | 2.2 (including) | 2.2 (including) |
Kde | Kde | 2.2.1 (including) | 2.2.1 (including) |
Kde | Kde | 2.2.2 (including) | 2.2.2 (including) |
Kde | Kde | 3.0 (including) | 3.0 (including) |
Kde | Kde | 3.0.1 (including) | 3.0.1 (including) |
Kde | Kde | 3.0.2 (including) | 3.0.2 (including) |
Kde | Kde | 3.0.3 (including) | 3.0.3 (including) |
Kde | Kde | 3.0.3a (including) | 3.0.3a (including) |
Kde | Kde | 3.0.4 (including) | 3.0.4 (including) |
Kde | Kde | 3.0.5 (including) | 3.0.5 (including) |
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 | RedHat | * | |
Red Hat Linux 7.1 | RedHat | * | |
Red Hat Linux 7.2 | RedHat | * | |
Red Hat Linux 7.3 | RedHat | * | |
Red Hat Linux 8.0 | RedHat | * | |
Red Hat Linux 9 | RedHat | * | |
Red Hat Linux Advanced Workstation 2.1 | RedHat | * |