exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 26720

Secunia Security Advisory 26720
Posted Sep 7, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for konqueror. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof, vulnerability
systems | linux, mandriva
SHA-256 | 6f2852152dd0ec9df704582083c6584d885fe7bbf9df769c59b8ac898aaf79be

Secunia Security Advisory 26720

Change Mirror Download


----------------------------------------------------------------------

BETA test the new Secunia Personal Software Inspector!

The Secunia PSI detects installed software on your computer and
categorises it as either Insecure, End-of-Life, or Up-To-Date.
Effectively enabling you to focus your attention on software
installations where more secure versions are available from the
vendors.

Download the free PSI BETA from the Secunia website:
https://psi.secunia.com/

----------------------------------------------------------------------

TITLE:
Mandriva update for konqueror

SECUNIA ADVISORY ID:
SA26720

VERIFY ADVISORY:
https://secunia.com/advisories/26720/

CRITICAL:
Less critical

IMPACT:
Spoofing

WHERE:
>From remote

OPERATING SYSTEM:
Mandriva Linux 2007
https://secunia.com/product/12165/

DESCRIPTION:
Mandriva has issued an update for konqueror. This fixes some
vulnerabilities, which can be exploited by malicious people to
conduct spoofing attacks.

For more information:
SA26091
SA26351

SOLUTION:
Apply updated packages.

-- Mandriva Linux 2007 --

dba4b66e6d9c05146cbd25b342560c0e
2007.0/i586/kdebase-3.5.4-35.4mdv2007.0.i586.rpm
84129cc9a6094fcb86d7fed04eb919dc
2007.0/i586/kdebase-common-3.5.4-35.4mdv2007.0.i586.rpm
16c09facd07da14e858f841c0c7a98a9
2007.0/i586/kdebase-kate-3.5.4-35.4mdv2007.0.i586.rpm
f6e7bbd6463eeb02845b7cfb74a3398c
2007.0/i586/kdebase-kdeprintfax-3.5.4-35.4mdv2007.0.i586.rpm
209d0fdf46670f17d8f71351aa890ecf
2007.0/i586/kdebase-kdm-3.5.4-35.4mdv2007.0.i586.rpm
7d91580c285ca605918090ff8aa7f62a
2007.0/i586/kdebase-kmenuedit-3.5.4-35.4mdv2007.0.i586.rpm
8f3de29b87818157f8cce9ebe6dc7ce9
2007.0/i586/kdebase-konsole-3.5.4-35.4mdv2007.0.i586.rpm
9205eb1e156034da0bc2fc24b9cfdac7
2007.0/i586/kdebase-nsplugins-3.5.4-35.4mdv2007.0.i586.rpm
85d82f838ac9f8d445a934fb861c1675
2007.0/i586/kdebase-progs-3.5.4-35.4mdv2007.0.i586.rpm
54b949917bbd6f2e56f42b827008f75f
2007.0/i586/kdelibs-common-3.5.4-19.6mdv2007.0.i586.rpm
36aa12ce60ac93de04d83ac57442936a
2007.0/i586/kdelibs-devel-doc-3.5.4-19.6mdv2007.0.i586.rpm
de1847cd72bde5c8dd80e8f14572fe80
2007.0/i586/libkdebase4-3.5.4-35.4mdv2007.0.i586.rpm
e915e0a2dbd46e282455a954f50304f2
2007.0/i586/libkdebase4-devel-3.5.4-35.4mdv2007.0.i586.rpm
21f5424cdd6890031bf3b75fac781592
2007.0/i586/libkdebase4-kate-3.5.4-35.4mdv2007.0.i586.rpm
caafc7ceefbee5c1874f9227906eb737
2007.0/i586/libkdebase4-kate-devel-3.5.4-35.4mdv2007.0.i586.rpm
f94cf0e9d38eb3b4ed0dd6e3e3929db9
2007.0/i586/libkdebase4-kmenuedit-3.5.4-35.4mdv2007.0.i586.rpm
4332d3646a91ee5016fc9a86edbf1d69
2007.0/i586/libkdebase4-konsole-3.5.4-35.4mdv2007.0.i586.rpm
2ef7da707ec19c64e7fc6114ae4839a7
2007.0/i586/libkdecore4-3.5.4-19.6mdv2007.0.i586.rpm
6217412db42f4e638af260110843aab7
2007.0/i586/libkdecore4-devel-3.5.4-19.6mdv2007.0.i586.rpm
f0d0e9ed46e922b25739f3d2f990c18d
2007.0/SRPMS/kdebase-3.5.4-35.4mdv2007.0.src.rpm
fa06b932bbbf7b55d2e15e5b36c670bb
2007.0/SRPMS/kdelibs-3.5.4-19.6mdv2007.0.src.rpm

-- Mandriva Linux 2007/X86_64 --

e1a881a693ff5f7d7e2cfe2c344b81c5
2007.0/x86_64/kdebase-3.5.4-35.4mdv2007.0.x86_64.rpm
14b14442fa9874636cc98a80c42cffa3
2007.0/x86_64/kdebase-common-3.5.4-35.4mdv2007.0.x86_64.rpm
c74ea565694a82cbc60a5b4dbdbf662f
2007.0/x86_64/kdebase-kate-3.5.4-35.4mdv2007.0.x86_64.rpm
056630a84e60d704647b1879ce2b2d83
2007.0/x86_64/kdebase-kdeprintfax-3.5.4-35.4mdv2007.0.x86_64.rpm
3c5bb19d5b46152c72c508b0c08c7a1a
2007.0/x86_64/kdebase-kdm-3.5.4-35.4mdv2007.0.x86_64.rpm
66ffc262e1c6d7140ba5db7507c57b6e
2007.0/x86_64/kdebase-kmenuedit-3.5.4-35.4mdv2007.0.x86_64.rpm
5592b8106391f9d2afbd8882d977bb56
2007.0/x86_64/kdebase-konsole-3.5.4-35.4mdv2007.0.x86_64.rpm
da3cd3792e29b1ecfba782337d23adb5
2007.0/x86_64/kdebase-nsplugins-3.5.4-35.4mdv2007.0.x86_64.rpm
b50d99eaf3e8cd64f5f8e1cf2122595c
2007.0/x86_64/kdebase-progs-3.5.4-35.4mdv2007.0.x86_64.rpm
e17925ebddeb5ddc8fa38839fb2828a3
2007.0/x86_64/kdelibs-common-3.5.4-19.6mdv2007.0.x86_64.rpm
25db4c696fb6fa7a2982e4a9ae48aba7
2007.0/x86_64/kdelibs-devel-doc-3.5.4-19.6mdv2007.0.x86_64.rpm
86cce76d83cb7676c2db63e6aaa3084b
2007.0/x86_64/lib64kdebase4-3.5.4-35.4mdv2007.0.x86_64.rpm
a22a5a0c6ec25aa3fbf10359dbbe99d2
2007.0/x86_64/lib64kdebase4-devel-3.5.4-35.4mdv2007.0.x86_64.rpm
ebc27724629079d3f31de145dd245abd
2007.0/x86_64/lib64kdebase4-kate-3.5.4-35.4mdv2007.0.x86_64.rpm
aae886b51f20df9266371e6d6bf6703a
2007.0/x86_64/lib64kdebase4-kate-devel-3.5.4-35.4mdv2007.0.x86_64.rpm
9c23a1742091ca76d47cb4126bd2f848
2007.0/x86_64/lib64kdebase4-kmenuedit-3.5.4-35.4mdv2007.0.x86_64.rpm
ea3763e9f61ac67bf44e51afed0a6c3a
2007.0/x86_64/lib64kdebase4-konsole-3.5.4-35.4mdv2007.0.x86_64.rpm
1e7cd4af463e151b237e8c7a5a2a368f
2007.0/x86_64/lib64kdecore4-3.5.4-19.6mdv2007.0.x86_64.rpm
dbd98b71a4b777f2622ec4bf2e0313f5
2007.0/x86_64/lib64kdecore4-devel-3.5.4-19.6mdv2007.0.x86_64.rpm
f0d0e9ed46e922b25739f3d2f990c18d
2007.0/SRPMS/kdebase-3.5.4-35.4mdv2007.0.src.rpm
fa06b932bbbf7b55d2e15e5b36c670bb
2007.0/SRPMS/kdelibs-3.5.4-19.6mdv2007.0.src.rpm

ORIGINAL ADVISORY:
https://www.mandriva.com/security/advisories?name=MDKSA-2007:176

OTHER REFERENCES:
SA26091:
https://secunia.com/advisories/26091/

SA26351:
https://secunia.com/advisories/26351/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
https://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
https://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close