group.of.nepali.translators team mailing list archive
-
group.of.nepali.translators team
-
Mailing list archive
-
Message #11437
[Bug 1668871] Re: kio: Information Leak when accessing https when using a malicious PAC file
This bug was fixed in the package kde4libs - 4:4.14.22-0ubuntu2.1
---------------
kde4libs (4:4.14.22-0ubuntu2.1) yakkety-security; urgency=medium
* SECURITY UPDATE:Information Leak when accessing https when using a
malicious PAC file
- debian/patches/kio-sanitize-url-to-FindProxyForURL.patch
- Thanks to Safebreach Labs researchers Safebreach Labs researchers
Itzik Kotler, Yonatan Fridburg and Amit Klein for reporting this
issue, Albert Astals Cid for fixing this issue.
- No CVE number.
- fixes (LP: #1668871)
-- vishnu@xxxxxxxxxxxxxxx (v.naini) Wed, 01 Mar 2017 14:38:27 +0530
** Changed in: kde4libs (Ubuntu Yakkety)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1668871
Title:
kio: Information Leak when accessing https when using a malicious PAC
file
Status in kde4libs package in Ubuntu:
New
Status in kio package in Ubuntu:
New
Status in kde4libs source package in Trusty:
New
Status in kde4libs source package in Xenial:
New
Status in kio source package in Xenial:
New
Status in kde4libs source package in Yakkety:
Fix Released
Status in kio source package in Yakkety:
Fix Released
Status in kde4libs source package in Zesty:
New
Status in kio source package in Zesty:
New
Bug description:
KDE Project Security Advisory
=============================
Title: kio: Information Leak when accessing https when using a malicious PAC file
Risk Rating: Medium
CVE: TBC
Versions: kio < 5.32, kdelibs < 4.14.30
Date: 28 February 2017
Overview
========
Using a malicious PAC file, and then using exfiltration methods in the PAC
function FindProxyForURL() enables the attacker to expose full https URLs.
This is a security issue since https URLs may contain sensitive
information in the URL authentication part (user:password@host), and in the
path and the query (e.g. access tokens).
This attack can be carried out remotely (over the LAN) since proxy settings
allow “Detect Proxy Configuration Automatically”.
This setting uses WPAD to retrieve the PAC file, and an attacker who has access
to the victim’s LAN can interfere with the WPAD protocols (DHCP/DNS+HTTP)
and inject his/her own malicious PAC instead of the legitimate one.
Solution
========
Update to kio >= 5.32 and kdelibs >= 4.14.30 (when released)
Or apply the following patches:
kio: https://commits.kde.org/kio/f9d0cb47cf94e209f6171ac0e8d774e68156a6e4
kdelibs: https://commits.kde.org/kdelibs/1804c2fde7bf4e432c6cf5bb8cce5701c7010559
Credits
=======
Thanks to Safebreach Labs researchers Itzik Kotler, Yonatan Fridburg
and Amit Klein.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kde4libs/+bug/1668871/+subscriptions