security bug in kget

Bug #578856 reported by Jonathan Riddell
264
This bug affects 1 person
Affects Status Importance Assigned to Milestone
kdenetwork (Ubuntu)
Fix Released
High
Jonathan Riddell
Jaunty
Fix Released
High
Jonathan Riddell
Karmic
Fix Released
High
Jonathan Riddell
Lucid
Fix Released
High
Jonathan Riddell
Maverick
Fix Released
High
Jonathan Riddell

Bug Description

Binary package hint: kdenetwork

Secunia has assigned SA39528 to it; CVE-2010-1000 is also assigned to it.

Secunia Research has discovered a vulnerability in KDE KGet,
which can be exploited by malicious people to compromise a user's
system.

The "name" attribute of the "file" element of metalink files is not
properly sanitised before being used to download files. If a user is
tricked into downloading from a specially crafted metalink file, this
can be exploited to download files to directories outside of the
intended download directory via directory traversal attacks.

Tags: patch
Revision history for this message
Jonathan Riddell (jr) wrote :

TEST CASE: download attached metalink file with kget. 4.4.2-0ubuntu4 will download to /tmp. 4.4.2-0ubuntu4.1 will complain that it's an invalid file and refuse to download

Revision history for this message
Jonathan Riddell (jr) wrote :
Revision history for this message
Jonathan Riddell (jr) wrote :
Revision history for this message
Jonathan Riddell (jr) wrote :

This code was rewritten in KDE Sc 4.4 and did not exist in previous versions of KDE so no patch needed for older Ubuntu versions as far as I know, will confirm with other distros.

Revision history for this message
Jonathan Riddell (jr) wrote :

Both debdiffs built and tested locally by me and successfully pass the above test case

Revision history for this message
Jonathan Riddell (jr) wrote :

 kdenetwork_4.4.2-0ubuntu4.1 uploaded to lucid-security

embargoed until Thursday 13th May 0900 UTC

Revision history for this message
Jonathan Riddell (jr) wrote :

Hmm, upload says "This upload queue does not permit SECURITY uploads."

Revision history for this message
Jamie Strandboge (jdstrand) wrote :

Oh sorry-- yeah, we need to process the uploads. The debdiffs are enough. What versions are affected? Is it only lucid?

Revision history for this message
Jonathan Riddell (jr) wrote :
Revision history for this message
Jonathan Riddell (jr) wrote :
Revision history for this message
Jonathan Riddell (jr) wrote :
Revision history for this message
Jonathan Riddell (jr) wrote :
Revision history for this message
Jonathan Riddell (jr) wrote :

After discussing with other distros there is a smaller patch needed for kdenetwork 4.3 (karmic) and 4.2 (jaunty). Older versions are not supported by Kubuntu.

Testing now

Revision history for this message
Jonathan Riddell (jr) wrote :

All versions passed the test case.

Jamie please upload to -security tomorrow (Thursday) at 0900UTC

I'll upload the packages to backports.

Revision history for this message
Jamie Strandboge (jdstrand) wrote :

This are in the security queue now and building. ACK the CRD. I'll test those builds tonight and push tomorrow at the CRD. Thanks for your work on this! :)

Revision history for this message
Jonathan Riddell (jr) wrote :

NEW RELEASE TIME

embargo lift time is now 1100UTC (1300 central europe) on Thursday 13th May. Please release at lunch time.

Revision history for this message
Jamie Strandboge (jdstrand) wrote :

ACK

Revision history for this message
Jamie Strandboge (jdstrand) wrote :

In testing this locally, I found that the original attached foo.metalink file was malformed beyond the directory traversal issue which after patching would fail, but not because of the directory traversal check. Attached is a properly formed metalink file excepting the directory traversal.

Changed in kdenetwork (Ubuntu):
status: New → Fix Committed
importance: Undecided → Medium
Revision history for this message
Jamie Strandboge (jdstrand) wrote :

Here is a valid metalink file for testing that no regressions were added.

Revision history for this message
Jamie Strandboge (jdstrand) wrote :

Argh the jaunty debdiff didn't update the series file so the patch didn't get applied during the build. I'm uploading now.

Changed in kdenetwork (Ubuntu Lucid):
status: New → Fix Committed
importance: Undecided → Medium
assignee: nobody → Jonathan Riddell (jr)
Changed in kdenetwork (Ubuntu Maverick):
assignee: nobody → Jonathan Riddell (jr)
Changed in kdenetwork (Ubuntu Jaunty):
status: New → Fix Committed
importance: Undecided → Medium
assignee: nobody → Jonathan Riddell (jr)
Changed in kdenetwork (Ubuntu Karmic):
status: New → Fix Committed
importance: Undecided → Medium
assignee: nobody → Jonathan Riddell (jr)
Changed in kdenetwork (Ubuntu Maverick):
status: Fix Committed → Triaged
Changed in kdenetwork (Ubuntu Lucid):
importance: Medium → High
Changed in kdenetwork (Ubuntu Maverick):
importance: Medium → High
Changed in kdenetwork (Ubuntu Jaunty):
importance: Medium → High
Changed in kdenetwork (Ubuntu Karmic):
importance: Medium → High
Revision history for this message
Jamie Strandboge (jdstrand) wrote :

Verified updated jaunty package fixes the issue.

Revision history for this message
Jamie Strandboge (jdstrand) wrote :

Upped the priority to High since startup files can be modified to execute arbitrary code, which could easily start a reverse shell.

Revision history for this message
Jonathan Riddell (jr) wrote :

NEW RELEASE TIME

embargo lift time is now 1200UTC (1400 central europe) on Thursday 13th May. Please release /after/ lunch time.

Revision history for this message
Jamie Strandboge (jdstrand) wrote :

ACK

Revision history for this message
Jamie Strandboge (jdstrand) wrote :

Unembargoed just now:
        Publishing kdenetwork 4:4.4.2-0ubuntu4.1 to lucid-security ...
        Publishing kdenetwork 4:4.3.2-0ubuntu4.1 to karmic-security ...
        Publishing kdenetwork 4:4.2.2-0ubuntu2.3 to jaunty-security ...

These will be live in the next publishing run (ie, it will all start at 12:05 UTC).

Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package kdenetwork - 4:4.4.2-0ubuntu4.1

---------------
kdenetwork (4:4.4.2-0ubuntu4.1) lucid-security; urgency=low

  * SECURITY UPDATE: file name directory traversal attack (LP: #578856).
   - Add debian/patches/kubuntu_01_kget_CVE-2010-1000.diff
   - kget/ui/metalinkcreator/metalinker.cpp check filename is valid
   - kget/transfer-plugins/metalink/metalink.cpp if the dialog was not accepted untick every file, so that the download does not start
   - CVE-2010-1000, SA39528
 -- Jonathan Riddell <email address hidden> Tue, 11 May 2010 16:26:45 +0100

Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package kdenetwork - 4:4.3.2-0ubuntu4.1

---------------
kdenetwork (4:4.3.2-0ubuntu4.1) karmic-security; urgency=low

  * SECURITY UPDATE: file name directory traversal attack (LP: #578856).
   - Add debian/patches/kubuntu_01_kget_CVE-2010-1000.diff
   - kget/ui/metalinkcreator/metalinker.cpp check filename is valid
   - CVE-2010-1000, SA39528
 -- Jonathan Riddell <email address hidden> Wed, 12 May 2010 10:19:09 +0100

Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package kdenetwork - 4:4.2.2-0ubuntu2.3

---------------
kdenetwork (4:4.2.2-0ubuntu2.3) jaunty-security; urgency=low

  * SECURITY UPDATE: file name directory traversal attack (LP: #578856).
   - Add debian/patches/kubuntu_01_kget_CVE-2010-1000.diff
   - kget/ui/metalinkcreator/metalinker.cpp check filename is valid
   - CVE-2010-1000, SA39528
 -- Jonathan Riddell <email address hidden> Wed, 12 May 2010 10:25:53 +0100

Changed in kdenetwork (Ubuntu Jaunty):
status: Fix Committed → Fix Released
Changed in kdenetwork (Ubuntu Karmic):
status: Fix Committed → Fix Released
Changed in kdenetwork (Ubuntu Lucid):
status: Fix Committed → Fix Released
visibility: private → public
tags: added: patch
Revision history for this message
Jonathan Thomas (echidnaman) wrote :

Fixed in maverick.

Changed in kdenetwork (Ubuntu Maverick):
status: Triaged → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.