fkie_cve-2003-0204
Vulnerability from fkie_nvd
Published
2003-05-05 04:00
Modified
2024-11-20 23:44
Severity ?
Summary
KDE 2 and KDE 3.1.1 and earlier 3.x versions allows attackers to execute arbitrary commands via (1) PostScript (PS) or (2) PDF files, related to missing -dPARANOIDSAFER and -dSAFER arguments when using the kghostview Ghostscript viewer.
References
cve@mitre.orghttp://bugs.kde.org/show_bug.cgi?id=53343
cve@mitre.orghttp://bugs.kde.org/show_bug.cgi?id=56808
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000668
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000747
cve@mitre.orghttp://marc.info/?l=bugtraq&m=105001557020141&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=105012994719099&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=105017403010459&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=105034222521369&w=2
cve@mitre.orghttp://www.debian.org/security/2003/dsa-284Patch, Vendor Advisory
cve@mitre.orghttp://www.debian.org/security/2003/dsa-293
cve@mitre.orghttp://www.debian.org/security/2003/dsa-296
cve@mitre.orghttp://www.kde.org/info/security/advisory-20030409-1.txtPatch, Vendor Advisory
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2003:049
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2003-002.html
af854a3a-2127-422b-91ae-364da2661108http://bugs.kde.org/show_bug.cgi?id=53343
af854a3a-2127-422b-91ae-364da2661108http://bugs.kde.org/show_bug.cgi?id=56808
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000668
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000747
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=105001557020141&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=105012994719099&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=105017403010459&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=105034222521369&w=2
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2003/dsa-284Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2003/dsa-293
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2003/dsa-296
af854a3a-2127-422b-91ae-364da2661108http://www.kde.org/info/security/advisory-20030409-1.txtPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2003:049
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2003-002.html
Impacted products
Vendor Product Version
kde kde 2.0
kde kde 2.0.1
kde kde 2.1
kde kde 2.1.1
kde kde 2.1.2
kde kde 2.2
kde kde 2.2.1
kde kde 2.2.2
kde kde 3.0
kde kde 3.0.1
kde kde 3.0.2
kde kde 3.0.3
kde kde 3.0.3a
kde kde 3.0.4
kde kde 3.0.5
kde kde 3.0.5a
kde kde 3.1
kde kde 3.1.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:kde:kde:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6671EEE2-8CEC-41C7-9CF2-23D92A1B3DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:kde:kde:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4F3ACDA-8DB4-4E59-B673-021CEBD03D8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:kde:kde:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C5E480F-A87E-4583-BC75-8596206C0895",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:kde:kde:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EF4C94E-54BB-44DB-BB7D-841419C4D3A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:kde:kde:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B292C704-EDFA-4060-90DF-0A3906DB0AC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:kde:kde:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5DBFB51-48EB-41E5-9712-0A5368EE56A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:kde:kde:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEAE9343-7A7F-4CB0-8CEF-52D61BD689C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:kde:kde:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F531972-E0A7-4E7C-A899-3766CEAAE2EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:kde:kde:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CEED379-3111-4451-B782-8C66CE568A1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:kde:kde:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B146FCD3-F6E7-4412-94FD-F9E66089C227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:kde:kde:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "99CB51E4-0BFC-4C7C-B9EE-3DBCB0188D73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:kde:kde:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C629F0C8-C765-4076-B426-80929F9CE285",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:kde:kde:3.0.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "E107A931-B670-42A8-9F75-EEA0EF3D09B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:kde:kde:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "671D1461-4AB4-4FB6-977D-733888A1BA9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:kde:kde:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E268EFFF-6B28-4C64-B052-AFA3BB1E709F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:kde:kde:3.0.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF9B6CD2-7343-4D68-BEC6-A7BB0E0F0962",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:kde:kde:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F98A556-D640-40F1-92C2-FC262F50F5C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:kde:kde:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7E2C256-8E9F-4D12-ABF4-FECE06B52CAA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "KDE 2 and KDE 3.1.1 and earlier 3.x versions allows attackers to execute arbitrary commands via (1) PostScript (PS) or (2) PDF files, related to missing -dPARANOIDSAFER and -dSAFER arguments when using the kghostview Ghostscript viewer."
    },
    {
      "lang": "es",
      "value": "KDE 2 y KDE 3.1.1 y versiones 3.x anteriores permiten a atacantes ejecutar comandos arbitrarios mediante ficheros PostScript (PS) o PDF, relacionado con la falta de argumentos -dSAFER y -dPARANOIDSAFER"
    }
  ],
  "id": "CVE-2003-0204",
  "lastModified": "2024-11-20T23:44:12.470",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2003-05-05T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.kde.org/show_bug.cgi?id=53343"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.kde.org/show_bug.cgi?id=56808"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000668"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000747"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=105001557020141\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=105012994719099\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=105017403010459\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=105034222521369\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.debian.org/security/2003/dsa-284"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2003/dsa-293"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2003/dsa-296"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.kde.org/info/security/advisory-20030409-1.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:049"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2003-002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.kde.org/show_bug.cgi?id=53343"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.kde.org/show_bug.cgi?id=56808"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000668"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000747"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=105001557020141\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=105012994719099\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=105017403010459\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=105034222521369\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.debian.org/security/2003/dsa-284"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2003/dsa-293"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2003/dsa-296"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.kde.org/info/security/advisory-20030409-1.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:049"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2003-002.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.