CVE-2014-8600
Summary
| CVE | CVE-2014-8600 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2014-12-08 11:59:00 UTC |
| Updated | 2018-10-30 16:27:00 UTC |
| Description | Multiple cross-site scripting (XSS) vulnerabilities in KDE-Runtime 4.14.3 and earlier, kwebkitpart 1.3.4 and earlier, and kio-extras 5.1.1 and earlier allow remote attackers to inject arbitrary web script or HTML via a crafted URI using the (1) zip, (2) trash, (3) tar, (4) thumbnail, (5) smtps, (6) smtp, (7) smb, (8) remote, (9) recentdocuments, (10) nntps, (11) nntp, (12) network, (13) mbox, (14) ldaps, (15) ldap, (16) fonts, (17) file, (18) desktop, (19) cgi, (20) bookmarks, or (21) ar scheme, which is not properly handled in an error message. |
Risk And Classification
Problem Types: CWE-79
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Kde | Kde-runtime | All | All | All | All |
| Application | Kde | Kio-extras | All | All | All | All |
| Operating System | Opensuse | Opensuse | 13.1 | All | All | All |
| Operating System | Opensuse | Opensuse | 13.1 | All | All | All |
| Application | Urs Wolfer | Kwebkitpart | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| openSUSE-SU-2015:0573-1: moderate: Security update for kdebase4-runtime, | SUSE | lists.opensuse.org | |
| Multiple KDE Products CVE-2014-8600 Multiple Security Bypass Vulnerabilities | BID | www.securityfocus.com | |
| cve-2014-8600 - Portcullis | MISC | www.portcullis-security.com | Exploit |
| Full Disclosure: CVE-2014-8600 - Insufficient Input Validation By IO Slaves In KDE e.V. KDE | FULLDISC | seclists.org | Exploit |
| USN-2414-1: KDE-Runtime vulnerability | Ubuntu | UBUNTU | ubuntu.com | Patch, Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.