{"vuid":"VU#420222","idnumber":"420222","name":"Konqueror fails to restrict access to Java classes","keywords":["Konqueror","bypass restriction","Java","applet","sandbox","KDE"],"overview":"The Konqueror web browser may allow Java applets and JavaScripts to bypass the Java security settings and access restricted Java classes. Exploitation may allow a remote attacker to read and write arbitrary files on a vulnerable system.","clean_desc":"Konqueror is a web browser and file manager for the K Desktop Environment (KDE). A flaw in Konqueror may allow Java applets and JavaScripts to bypass the Java security settings and access restricted Java classes. Once the security restrictions are bypassed, the malicious applet or script may be able to access and manipulate system resources. For more information on the Java security model see Sun's Java documentation, particularly the Applet Security FAQ referenced above. Microsoft provides similar documentation in its Java Security Overview and a corresponding FAQ. Note that Java must be enabled in Konqueror to exploit this vulnerability with a Java applet. For exploitation via JavaScript, active scripting must be enabled.","impact":"By enticing a user to view and execute a malicious Java applet or JavaScript , a remote attacker may be able to read and write arbitrary files with the privileges of the browser process.","resolution":"Upgrade Update to Konqueror version 3.3.2. Apply Patch A patch for Konqueror 3.2.3 is available to correct this issue.","workarounds":"Disable Active Scripting and Java \nAt a minimum, disable Active scripting and Java within the web browser. Instructions for disabling Active scripting and Java can be found in the CERT/CC Malicious Web Scripts FAQ.","sysaffected":"","thanks":"This vulnerability was publicly reported by Waldo Bastian.","author":"This document was written by Jeff Gennari.","public":["http://www.kde.org/info/security/advisory-20041220-1.txt","http://secunia.com/advisories/13586/","http://xforce.iss.net/xforce/xfdb/18596","http://www.osvdb.org/displayvuln.php?osvdb_id=12512"],"cveids":["CVE-2004-1145"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-12-20T19:25:58Z","publicdate":"2004-12-20T00:00:00Z","datefirstpublished":"2005-01-05T17:04:44Z","dateupdated":"2005-01-14T14:40:15Z","revision":49,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"15","cam_impact":"7","cam_easeofexploitation":"11","cam_attackeraccessrequired":"10","cam_scorecurrent":"3.898125","cam_scorecurrentwidelyknown":"4.9809375","cam_scorecurrentwidelyknownexploited":"9.3121875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":3.898125,"vulnote":null}