[prev in list] [next in list] [prev in thread] [next in thread] 

List:       kde-announce
Subject:    [kde-announce] Security advisory: Konversation - out-of-bounds read on a heap-allocated
From:       Eike Hein <hein () kde ! org>
Date:       2014-11-04 18:37:56
Message-ID: 54591D04.4040206 () kde ! org
[Download RAW message or body]

KDE Project Security Advisory
=============================

Title:          Konversation: out-of-bounds read on a heap-allocated array
Risk Rating:    Low
CVE:            CVE-2014-8483
Platforms:      All
Versions:       konversation < 1.5.1
Author:         Eike Hein <hein@kde.org>
Date:           04 November 2014

Overview
========

Konversation's Blowfish ECB encryption support assumes incoming blocks
to be the expected 12 bytes. The lack of a sanity-check for the actual
size can cause a denial of service and an information leak to the local
user.

Konversation 1.5.1 has been released with a patch to address this issue.

Impact
======

When using Blowfish ECB encryption with another party (an IRC channel
or user), sending malformed blocks to Konversation can result in a
crash or an information leak up to 11 bytes to the local user, due to
an out-of-bounds read on a heap-allocated array.

Solution
========

Upgrade Konversation to 1.5.1 (released November 4th, 2014) or apply
the following patch to Konversation 1.5:

http://quickgit.kde.org/?p=konversation.git&a=commit&h=1f55cee8b3d0956adc98834f7b5832e48e077ed7

Credits
=======

Thanks to Pierre Schweitzer for bringing the bug to the attention of
oss-security.

Thanks to Manuel Nickschas from Quassel for notifying us about the
problem (Quassel incorporated the faulty Konversation code in 2009)
and writing the patch adopted for Konversation 1.5.1.

_______________________________________________
kde-announce mailing list
kde-announce@kde.org
https://mail.kde.org/mailman/listinfo/kde-announce
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic