=====================================================================
                                  CERT-Renater

                       Note d'Information No. 2005/VULN277
_____________________________________________________________________

DATE                      : 22/04/2005

HARDWARE PLATFORM(S)      : /

OPERATING SYSTEM(S)       : Systems running Quanta 3.1.x, KDE 3.2 up
                                   to and including KDE 3.4.0.

======================================================================

KDE Security Advisory: kimgio input validation errors
Original Release Date: 2005-04-21
URL: http://www.kde.org/info/security/advisory-20050421-1.txt

0. References

         http://bugs.kde.org/102328
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1046


1. Systems affected:

         kdelibs as shipped with KDE 3.2 up to including KDE 3.4.


2. Overview:

         kimgio contains a PCX image file format reader that does
         not properly perform input validation. A source code audit
         performed by the KDE security team discovered several
         vulnerabilities in the PCX and other image file format
         readers, some of them exploitable to execute arbitrary
         code.


3. Impact:

         Remotly supplied, specially crafted image files can be used
         to execute arbitrary code.


4. Solution:

         Source code patches have been made available which fix these
         vulnerabilities. Contact your OS vendor / binary package provider
         for information about how to obtain updated binary packages.


5. Patch:

         A patch for KDE 3.4.0 is available from
         ftp://ftp.kde.org/pub/kde/security_patches :

         78473d4dad612e6617eb6652eec2ab80  post-3.4.0-kdelibs-kimgio.diff

         A patch for KDE 3.3.2 is available from
         ftp://ftp.kde.org/pub/kde/security_patches :

         8366d0e5c8101c315a0bdafac54536d6  post-3.3.2-kdelibs-kimgio.diff


6. Time line and credits:

         24/03/2005 Notification of KDE by Bruno Rohee
         21/04/2005 Coordinated Public Disclosure




======================================================================

         =========================================================
         Les serveurs de référence du CERT-Renater
         http://www.urec.fr/securite
         http://www.cru.fr/securite
         http://www.renater.fr
         =========================================================
         + CERT-RENATER          | tel : 01-53-94-20-44          +
         + 151 bd de l'Hopital   | fax : 01-53-94-20-41          +
         + 75013 Paris           | email: certsvp@renater.fr     +
         =========================================================




