{"vuid":"VU#820798","idnumber":"820798","name":"KDE Personal Information Management suite \"kdepim\" contains a buffer overflow vulnerability in VCF information reader","keywords":["KDE Personal Information Management","kdepim","buffer overflow","VCF"],"overview":"KDE Personal Information Management suite \"kdepim\" contains a buffer overflow vulnerability. Exploitation of this vulnerability could lead to the arbitrary execution of commands.","clean_desc":"KDE Personal Information Management suite shipped with KDE versions 3.1.0 through 3.1.4 contains a buffer overflow vulnerability in the processing of VCF files. If an attacker can trick a victim into opening a specially crafted .VCF file, the attacker may be able to gain information about a victim's data or execute arbitrary commands\n with the victim's privileges. This vulnerability may also be remotely exploited if the victim has previews for remote files enabled, however this feature is disabled by default.","impact":"An attacker may be able to gain information about a victim's data or execute arbitrary commands with the victim's privileges.","resolution":"Upgrade to KDE version 3.1.5 or apply the patch to version 3.1.4.","workarounds":"","sysaffected":"","thanks":"This vulnerability was discovered by Dirk Mueller of KDE and reported in their advisory.","author":"This document was written by Stacey Stewart.","public":["http://www.kde.org/info/security/advisory-20040114-1.txt","https://rhn.redhat.com/errata/RHSA-2004-006.html","http://www.secunia.com/advisories/10625/"],"cveids":["CVE-2003-0988"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-01-15T15:59:13Z","publicdate":"2004-01-14T00:00:00Z","datefirstpublished":"2004-01-27T20:10:16Z","dateupdated":"2004-01-27T20:10:30Z","revision":11,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"12","cam_impact":"15","cam_easeofexploitation":"12","cam_attackeraccessrequired":"10","cam_scorecurrent":"8.1","cam_scorecurrentwidelyknown":"10.125","cam_scorecurrentwidelyknownexploited":"18.225","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":8.1,"vulnote":null}