KDE Konqueror Assert Denial of Service Vulnerability
BID:25170
Info
KDE Konqueror Assert Denial of Service Vulnerability
| Bugtraq ID: | 25170 |
| Class: | Failure to Handle Exceptional Conditions |
| CVE: |
CVE-2007-4229 |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 05 2007 12:00AM |
| Updated: | May 07 2015 05:36PM |
| Credit: | Thomas Waldegger is credited with discovering this vulnerability. |
| Vulnerable: |
KDE Konqueror 3.5.7 KDE Konqueror 3.5.5 KDE Konqueror 3.5.2 KDE Konqueror 3.5.1 KDE Konqueror 3.3.2 KDE Konqueror 3.3.1 KDE Konqueror 3.3 KDE Konqueror 3.2.3 KDE Konqueror 3.2.2 -6 KDE Konqueror 3.2.1 KDE Konqueror 3.1.5 KDE Konqueror 3.1.4 KDE Konqueror 3.1.3 KDE Konqueror 3.1.2 KDE Konqueror 3.1.1 KDE Konqueror 3.1 KDE Konqueror 3.0.5 b KDE Konqueror 3.0.5 KDE Konqueror 3.0.3 KDE Konqueror 3.0.2 KDE Konqueror 3.0.1 KDE Konqueror 3.0 KDE Konqueror 2.2.2 KDE Konqueror 2.2.1 KDE Konqueror 2.1.2 KDE Konqueror 2.1.1 |
| Not Vulnerable: | |
Discussion
KDE Konqueror Assert Denial of Service Vulnerability
KDE Konqueror is prone to a remote denial-of-service vulnerability because it fails to handle improperly formated HTML code.
An attacker may exploit this vulnerability to cause Konqueror to crash, resulting in denial-of-service conditions.
Konqueror 3.5.7 and prior versions are reported vulnerable.
KDE Konqueror is prone to a remote denial-of-service vulnerability because it fails to handle improperly formated HTML code.
An attacker may exploit this vulnerability to cause Konqueror to crash, resulting in denial-of-service conditions.
Konqueror 3.5.7 and prior versions are reported vulnerable.
Exploit / POC
KDE Konqueror Assert Denial of Service Vulnerability
The following exploit is available:
The following exploit is available:
Solution / Fix
KDE Konqueror Assert Denial of Service Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].