CVE-2004-1145

Multiple vulnerabilities in Konqueror in KDE 3.3.1 and earlier (1) allow access to restricted Java classes via JavaScript and (2) do not properly restrict access to certain Java classes from the Java applet, which allows remote attackers to bypass sandbox restrictions and read or write arbitrary files.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ethereal_group:ethereal:0.9:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.9:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.10:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.11:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.12:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.13:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.14:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.15:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.16:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.10:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.10.1:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.10.2:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.10.3:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.10.4:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.10.5:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.10.6:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.10.7:*:*:*:*:*:*:*
cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*
cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:altlinux:alt_linux:2.3:*:compact:*:*:*:*:*
cpe:2.3:o:altlinux:alt_linux:2.3:*:junior:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*

History

20 Nov 2024, 23:50

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=110356286722875&w=2 - () http://marc.info/?l=bugtraq&m=110356286722875&w=2 -
References () http://secunia.com/advisories/13586 - Patch, Vendor Advisory () http://secunia.com/advisories/13586 - Patch, Vendor Advisory
References () http://www.gentoo.org/security/en/glsa/glsa-200501-16.xml - Patch, Vendor Advisory () http://www.gentoo.org/security/en/glsa/glsa-200501-16.xml - Patch, Vendor Advisory
References () http://www.heise.de/security/dienste/browsercheck/tests/java.shtml - Vendor Advisory () http://www.heise.de/security/dienste/browsercheck/tests/java.shtml - Vendor Advisory
References () http://www.kb.cert.org/vuls/id/420222 - Patch, Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/420222 - Patch, Third Party Advisory, US Government Resource
References () http://www.kde.org/info/security/advisory-20041220-1.txt - Patch, Vendor Advisory () http://www.kde.org/info/security/advisory-20041220-1.txt - Patch, Vendor Advisory
References () http://www.mandriva.com/security/advisories?name=MDKSA-2004:154 - () http://www.mandriva.com/security/advisories?name=MDKSA-2004:154 -
References () http://www.redhat.com/support/errata/RHSA-2005-065.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2005-065.html - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/18596 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/18596 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10173 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10173 -

Information

Published : 2004-12-15 05:00

Updated : 2024-11-20 23:50


NVD link : CVE-2004-1145

Mitre link : CVE-2004-1145

CVE.ORG link : CVE-2004-1145


JSON object : View

Products Affected

sgi

  • propack

redhat

  • enterprise_linux
  • enterprise_linux_desktop
  • linux_advanced_workstation

conectiva

  • linux

ethereal_group

  • ethereal

debian

  • debian_linux

suse

  • suse_linux

altlinux

  • alt_linux