[Group.of.nepali.translators] [Bug 1668871] Re: kio: Information Leak when accessing https when using a malicious PAC file

2017-03-01 Thread Rik Mills
** Also affects: kde4libs (Ubuntu)
   Importance: Undecided
   Status: New

** Also affects: kde4libs (Ubuntu Zesty)
   Importance: Undecided
   Status: New

** Also affects: kio (Ubuntu Zesty)
   Importance: Undecided
   Status: New

** Also affects: kde4libs (Ubuntu Yakkety)
   Importance: Undecided
   Status: New

** Also affects: kio (Ubuntu Yakkety)
   Importance: Undecided
   Status: New

** Also affects: kde4libs (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: kio (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: kde4libs (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: kio (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** No longer affects: kio (Ubuntu Trusty)

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1668871

Title:
  kio: Information Leak when accessing https when using a malicious PAC
  file

Status in kde4libs package in Ubuntu:
  New
Status in kio package in Ubuntu:
  New
Status in kde4libs source package in Trusty:
  New
Status in kde4libs source package in Xenial:
  New
Status in kio source package in Xenial:
  New
Status in kde4libs source package in Yakkety:
  New
Status in kio source package in Yakkety:
  New
Status in kde4libs source package in Zesty:
  New
Status in kio source package in Zesty:
  New

Bug description:
  KDE Project Security Advisory
  =

  Title:  kio: Information Leak when accessing https when using a 
malicious PAC file
  Risk Rating:Medium
  CVE:TBC
  Versions:   kio < 5.32, kdelibs < 4.14.30
  Date:   28 February 2017

  
  Overview
  
  Using a malicious PAC file, and then using exfiltration methods in the PAC
  function FindProxyForURL() enables the attacker to expose full https URLs.

  This is a security issue since https URLs may contain sensitive
  information in the URL authentication part (user:password@host), and in the
  path and the query (e.g. access tokens).

  This attack can be carried out remotely (over the LAN) since proxy settings
  allow “Detect Proxy Configuration Automatically”.
  This setting uses WPAD to retrieve the PAC file, and an attacker who has 
access
  to the victim’s LAN can interfere with the WPAD protocols (DHCP/DNS+HTTP)
  and inject his/her own malicious PAC instead of the legitimate one.

  Solution
  
  Update to kio >= 5.32 and kdelibs >= 4.14.30 (when released)

  Or apply the following patches:
  kio: https://commits.kde.org/kio/f9d0cb47cf94e209f6171ac0e8d774e68156a6e4
  kdelibs: 
https://commits.kde.org/kdelibs/1804c2fde7bf4e432c6cf5bb8cce5701c7010559

  Credits
  ===
  Thanks to Safebreach Labs researchers Itzik Kotler, Yonatan Fridburg
  and Amit Klein.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kde4libs/+bug/1668871/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1668871] Re: kio: Information Leak when accessing https when using a malicious PAC file

2017-03-02 Thread Launchpad Bug Tracker
This bug was fixed in the package kio - 5.26.0-0ubuntu2.1

---
kio (5.26.0-0ubuntu2.1) yakkety-security; urgency=medium

  * SECURITY UPDATE:Information Leak when accessing https when using a
malicious PAC file
  - debian/patches/kio-sanitize-url-to-FindProxyForURL.patch
  - Thanks to Safebreach Labs researchers Safebreach Labs researchers
Itzik Kotler, Yonatan Fridburg and Amit Klein for reporting this
issue, Albert Astals Cid for fixing this issue.
  - No CVE number.
  - fixes (LP: #1668871)

 -- vis...@vishnunaini.com (v.naini)  Wed, 01 Mar 2017 14:28:14 +0530

** Changed in: kio (Ubuntu Yakkety)
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1668871

Title:
  kio: Information Leak when accessing https when using a malicious PAC
  file

Status in kde4libs package in Ubuntu:
  New
Status in kio package in Ubuntu:
  New
Status in kde4libs source package in Trusty:
  New
Status in kde4libs source package in Xenial:
  New
Status in kio source package in Xenial:
  New
Status in kde4libs source package in Yakkety:
  Fix Released
Status in kio source package in Yakkety:
  Fix Released
Status in kde4libs source package in Zesty:
  New
Status in kio source package in Zesty:
  New

Bug description:
  KDE Project Security Advisory
  =

  Title:  kio: Information Leak when accessing https when using a 
malicious PAC file
  Risk Rating:Medium
  CVE:TBC
  Versions:   kio < 5.32, kdelibs < 4.14.30
  Date:   28 February 2017

  
  Overview
  
  Using a malicious PAC file, and then using exfiltration methods in the PAC
  function FindProxyForURL() enables the attacker to expose full https URLs.

  This is a security issue since https URLs may contain sensitive
  information in the URL authentication part (user:password@host), and in the
  path and the query (e.g. access tokens).

  This attack can be carried out remotely (over the LAN) since proxy settings
  allow “Detect Proxy Configuration Automatically”.
  This setting uses WPAD to retrieve the PAC file, and an attacker who has 
access
  to the victim’s LAN can interfere with the WPAD protocols (DHCP/DNS+HTTP)
  and inject his/her own malicious PAC instead of the legitimate one.

  Solution
  
  Update to kio >= 5.32 and kdelibs >= 4.14.30 (when released)

  Or apply the following patches:
  kio: https://commits.kde.org/kio/f9d0cb47cf94e209f6171ac0e8d774e68156a6e4
  kdelibs: 
https://commits.kde.org/kdelibs/1804c2fde7bf4e432c6cf5bb8cce5701c7010559

  Credits
  ===
  Thanks to Safebreach Labs researchers Itzik Kotler, Yonatan Fridburg
  and Amit Klein.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kde4libs/+bug/1668871/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1668871] Re: kio: Information Leak when accessing https when using a malicious PAC file

2017-03-02 Thread Launchpad Bug Tracker
This bug was fixed in the package kde4libs - 4:4.14.22-0ubuntu2.1

---
kde4libs (4:4.14.22-0ubuntu2.1) yakkety-security; urgency=medium

  * SECURITY UPDATE:Information Leak when accessing https when using a
malicious PAC file
  - debian/patches/kio-sanitize-url-to-FindProxyForURL.patch
  - Thanks to Safebreach Labs researchers Safebreach Labs researchers
Itzik Kotler, Yonatan Fridburg and Amit Klein for reporting this
issue, Albert Astals Cid for fixing this issue.
  - No CVE number.
  - fixes (LP: #1668871)

 -- vis...@vishnunaini.com (v.naini)  Wed, 01 Mar 2017 14:38:27 +0530

** Changed in: kde4libs (Ubuntu Yakkety)
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1668871

Title:
  kio: Information Leak when accessing https when using a malicious PAC
  file

Status in kde4libs package in Ubuntu:
  New
Status in kio package in Ubuntu:
  New
Status in kde4libs source package in Trusty:
  New
Status in kde4libs source package in Xenial:
  New
Status in kio source package in Xenial:
  New
Status in kde4libs source package in Yakkety:
  Fix Released
Status in kio source package in Yakkety:
  Fix Released
Status in kde4libs source package in Zesty:
  New
Status in kio source package in Zesty:
  New

Bug description:
  KDE Project Security Advisory
  =

  Title:  kio: Information Leak when accessing https when using a 
malicious PAC file
  Risk Rating:Medium
  CVE:TBC
  Versions:   kio < 5.32, kdelibs < 4.14.30
  Date:   28 February 2017

  
  Overview
  
  Using a malicious PAC file, and then using exfiltration methods in the PAC
  function FindProxyForURL() enables the attacker to expose full https URLs.

  This is a security issue since https URLs may contain sensitive
  information in the URL authentication part (user:password@host), and in the
  path and the query (e.g. access tokens).

  This attack can be carried out remotely (over the LAN) since proxy settings
  allow “Detect Proxy Configuration Automatically”.
  This setting uses WPAD to retrieve the PAC file, and an attacker who has 
access
  to the victim’s LAN can interfere with the WPAD protocols (DHCP/DNS+HTTP)
  and inject his/her own malicious PAC instead of the legitimate one.

  Solution
  
  Update to kio >= 5.32 and kdelibs >= 4.14.30 (when released)

  Or apply the following patches:
  kio: https://commits.kde.org/kio/f9d0cb47cf94e209f6171ac0e8d774e68156a6e4
  kdelibs: 
https://commits.kde.org/kdelibs/1804c2fde7bf4e432c6cf5bb8cce5701c7010559

  Credits
  ===
  Thanks to Safebreach Labs researchers Itzik Kotler, Yonatan Fridburg
  and Amit Klein.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kde4libs/+bug/1668871/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1668871] Re: kio: Information Leak when accessing https when using a malicious PAC file

2017-03-02 Thread Launchpad Bug Tracker
This bug was fixed in the package kde4libs - 4:4.14.16-0ubuntu3.1

---
kde4libs (4:4.14.16-0ubuntu3.1) xenial-security; urgency=medium

  * SECURITY UPDATE:Information Leak when accessing https when using a
malicious PAC file
- debian/patches/kio-sanitize-url-to-FindProxyForURL.patch
- Thanks to Safebreach Labs researchers Itzik Kotler, Yonatan Fridburg
  and Amit Klein for reporting this issue, Albert Astals Cid for fixing
  this issue.
- No CVE number.
- fixes (LP: #1668871)

 -- vis...@vishnunaini.com (v.naini)  Thu, 02 Mar 2017 21:43:06 +0530

** Changed in: kde4libs (Ubuntu Xenial)
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1668871

Title:
  kio: Information Leak when accessing https when using a malicious PAC
  file

Status in kde4libs package in Ubuntu:
  New
Status in kio package in Ubuntu:
  New
Status in kde4libs source package in Trusty:
  New
Status in kde4libs source package in Xenial:
  Fix Released
Status in kio source package in Xenial:
  Confirmed
Status in kde4libs source package in Yakkety:
  Fix Released
Status in kio source package in Yakkety:
  Fix Released
Status in kde4libs source package in Zesty:
  New
Status in kio source package in Zesty:
  New

Bug description:
  KDE Project Security Advisory
  =

  Title:  kio: Information Leak when accessing https when using a 
malicious PAC file
  Risk Rating:Medium
  CVE:TBC
  Versions:   kio < 5.32, kdelibs < 4.14.30
  Date:   28 February 2017

  
  Overview
  
  Using a malicious PAC file, and then using exfiltration methods in the PAC
  function FindProxyForURL() enables the attacker to expose full https URLs.

  This is a security issue since https URLs may contain sensitive
  information in the URL authentication part (user:password@host), and in the
  path and the query (e.g. access tokens).

  This attack can be carried out remotely (over the LAN) since proxy settings
  allow “Detect Proxy Configuration Automatically”.
  This setting uses WPAD to retrieve the PAC file, and an attacker who has 
access
  to the victim’s LAN can interfere with the WPAD protocols (DHCP/DNS+HTTP)
  and inject his/her own malicious PAC instead of the legitimate one.

  Solution
  
  Update to kio >= 5.32 and kdelibs >= 4.14.30 (when released)

  Or apply the following patches:
  kio: https://commits.kde.org/kio/f9d0cb47cf94e209f6171ac0e8d774e68156a6e4
  kdelibs: 
https://commits.kde.org/kdelibs/1804c2fde7bf4e432c6cf5bb8cce5701c7010559

  Credits
  ===
  Thanks to Safebreach Labs researchers Itzik Kotler, Yonatan Fridburg
  and Amit Klein.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kde4libs/+bug/1668871/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1668871] Re: kio: Information Leak when accessing https when using a malicious PAC file

2017-03-02 Thread Launchpad Bug Tracker
This bug was fixed in the package kio - 5.18.0-0ubuntu1.1

---
kio (5.18.0-0ubuntu1.1) xenial-security; urgency=medium

  * SECURITY UPDATE:Information Leak when accessing https when using a
malicious PAC file
- debian/patches/kio-sanitize-url-to-FindProxyForURL.patch
- Thanks to Safebreach Labs researchers Itzik Kotler, Yonatan Fridburg
  and Amit Klein for reporting this issue, Albert Astals Cid for fixing
  this issue.
- No CVE number.
- fixes (LP: #1668871)

 -- vis...@vishnunaini.com (v.naini)  Thu, 02 Mar 2017 21:17:20 +0530

** Changed in: kio (Ubuntu Xenial)
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1668871

Title:
  kio: Information Leak when accessing https when using a malicious PAC
  file

Status in kde4libs package in Ubuntu:
  New
Status in kio package in Ubuntu:
  New
Status in kde4libs source package in Trusty:
  New
Status in kde4libs source package in Xenial:
  Fix Released
Status in kio source package in Xenial:
  Fix Released
Status in kde4libs source package in Yakkety:
  Fix Released
Status in kio source package in Yakkety:
  Fix Released
Status in kde4libs source package in Zesty:
  New
Status in kio source package in Zesty:
  New

Bug description:
  KDE Project Security Advisory
  =

  Title:  kio: Information Leak when accessing https when using a 
malicious PAC file
  Risk Rating:Medium
  CVE:TBC
  Versions:   kio < 5.32, kdelibs < 4.14.30
  Date:   28 February 2017

  
  Overview
  
  Using a malicious PAC file, and then using exfiltration methods in the PAC
  function FindProxyForURL() enables the attacker to expose full https URLs.

  This is a security issue since https URLs may contain sensitive
  information in the URL authentication part (user:password@host), and in the
  path and the query (e.g. access tokens).

  This attack can be carried out remotely (over the LAN) since proxy settings
  allow “Detect Proxy Configuration Automatically”.
  This setting uses WPAD to retrieve the PAC file, and an attacker who has 
access
  to the victim’s LAN can interfere with the WPAD protocols (DHCP/DNS+HTTP)
  and inject his/her own malicious PAC instead of the legitimate one.

  Solution
  
  Update to kio >= 5.32 and kdelibs >= 4.14.30 (when released)

  Or apply the following patches:
  kio: https://commits.kde.org/kio/f9d0cb47cf94e209f6171ac0e8d774e68156a6e4
  kdelibs: 
https://commits.kde.org/kdelibs/1804c2fde7bf4e432c6cf5bb8cce5701c7010559

  Credits
  ===
  Thanks to Safebreach Labs researchers Itzik Kotler, Yonatan Fridburg
  and Amit Klein.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kde4libs/+bug/1668871/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1668871] Re: kio: Information Leak when accessing https when using a malicious PAC file

2017-03-03 Thread Launchpad Bug Tracker
This bug was fixed in the package kio - 5.31.0-0ubuntu2

---
kio (5.31.0-0ubuntu2) zesty; urgency=medium

  * SECURITY UPDATE:Information Leak when accessing https when using a
malicious PAC file
  - debian/patches/kio-sanitize-url-to-FindProxyForURL.patch
  - Thanks to Safebreach Labs researchers Safebreach Labs researchers
Itzik Kotler, Yonatan Fridburg and Amit Klein for reporting this
issue, Albert Astals Cid for fixing this issue.
  - No CVE number.
  - fixes (LP: #1668871)

 -- Rik Mills   Thu, 02 Mar 2017 21:55:03 +

** Changed in: kio (Ubuntu Zesty)
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1668871

Title:
  kio: Information Leak when accessing https when using a malicious PAC
  file

Status in kde4libs package in Ubuntu:
  Confirmed
Status in kio package in Ubuntu:
  Fix Released
Status in kde4libs source package in Trusty:
  New
Status in kde4libs source package in Xenial:
  Fix Released
Status in kio source package in Xenial:
  Fix Released
Status in kde4libs source package in Yakkety:
  Fix Released
Status in kio source package in Yakkety:
  Fix Released
Status in kde4libs source package in Zesty:
  Confirmed
Status in kio source package in Zesty:
  Fix Released

Bug description:
  KDE Project Security Advisory
  =

  Title:  kio: Information Leak when accessing https when using a 
malicious PAC file
  Risk Rating:Medium
  CVE:TBC
  Versions:   kio < 5.32, kdelibs < 4.14.30
  Date:   28 February 2017

  
  Overview
  
  Using a malicious PAC file, and then using exfiltration methods in the PAC
  function FindProxyForURL() enables the attacker to expose full https URLs.

  This is a security issue since https URLs may contain sensitive
  information in the URL authentication part (user:password@host), and in the
  path and the query (e.g. access tokens).

  This attack can be carried out remotely (over the LAN) since proxy settings
  allow “Detect Proxy Configuration Automatically”.
  This setting uses WPAD to retrieve the PAC file, and an attacker who has 
access
  to the victim’s LAN can interfere with the WPAD protocols (DHCP/DNS+HTTP)
  and inject his/her own malicious PAC instead of the legitimate one.

  Solution
  
  Update to kio >= 5.32 and kdelibs >= 4.14.30 (when released)

  Or apply the following patches:
  kio: https://commits.kde.org/kio/f9d0cb47cf94e209f6171ac0e8d774e68156a6e4
  kdelibs: 
https://commits.kde.org/kdelibs/1804c2fde7bf4e432c6cf5bb8cce5701c7010559

  Credits
  ===
  Thanks to Safebreach Labs researchers Itzik Kotler, Yonatan Fridburg
  and Amit Klein.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kde4libs/+bug/1668871/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1668871] Re: kio: Information Leak when accessing https when using a malicious PAC file

2017-03-04 Thread Launchpad Bug Tracker
This bug was fixed in the package kde4libs - 4:4.14.28-0ubuntu3

---
kde4libs (4:4.14.28-0ubuntu3) zesty; urgency=medium

  * SECURITY UPDATE:Information Leak when accessing https when using a
malicious PAC file
 - debian/patches/kio-sanitize-url-to-FindProxyForURL.patch
 - Thanks to Safebreach Labs researchers Safebreach Labs researchers
Itzik Kotler, Yonatan Fridburg and Amit Klein for reporting this
issue, Albert Astals Cid for fixing this issue.
  - No CVE number.
  - fixes (LP: #1668871)

 -- Rik Mills   Sat, 04 Mar 2017 10:07:23 +

** Changed in: kde4libs (Ubuntu Zesty)
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1668871

Title:
  kio: Information Leak when accessing https when using a malicious PAC
  file

Status in kde4libs package in Ubuntu:
  Fix Released
Status in kio package in Ubuntu:
  Fix Released
Status in kde4libs source package in Trusty:
  New
Status in kde4libs source package in Xenial:
  Fix Released
Status in kio source package in Xenial:
  Fix Released
Status in kde4libs source package in Yakkety:
  Fix Released
Status in kio source package in Yakkety:
  Fix Released
Status in kde4libs source package in Zesty:
  Fix Released
Status in kio source package in Zesty:
  Fix Released

Bug description:
  KDE Project Security Advisory
  =

  Title:  kio: Information Leak when accessing https when using a 
malicious PAC file
  Risk Rating:Medium
  CVE:TBC
  Versions:   kio < 5.32, kdelibs < 4.14.30
  Date:   28 February 2017

  
  Overview
  
  Using a malicious PAC file, and then using exfiltration methods in the PAC
  function FindProxyForURL() enables the attacker to expose full https URLs.

  This is a security issue since https URLs may contain sensitive
  information in the URL authentication part (user:password@host), and in the
  path and the query (e.g. access tokens).

  This attack can be carried out remotely (over the LAN) since proxy settings
  allow “Detect Proxy Configuration Automatically”.
  This setting uses WPAD to retrieve the PAC file, and an attacker who has 
access
  to the victim’s LAN can interfere with the WPAD protocols (DHCP/DNS+HTTP)
  and inject his/her own malicious PAC instead of the legitimate one.

  Solution
  
  Update to kio >= 5.32 and kdelibs >= 4.14.30 (when released)

  Or apply the following patches:
  kio: https://commits.kde.org/kio/f9d0cb47cf94e209f6171ac0e8d774e68156a6e4
  kdelibs: 
https://commits.kde.org/kdelibs/1804c2fde7bf4e432c6cf5bb8cce5701c7010559

  Credits
  ===
  Thanks to Safebreach Labs researchers Itzik Kotler, Yonatan Fridburg
  and Amit Klein.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kde4libs/+bug/1668871/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1668871] Re: kio: Information Leak when accessing https when using a malicious PAC file

2017-03-09 Thread Launchpad Bug Tracker
This bug was fixed in the package kde4libs - 4:4.13.3-0ubuntu0.4

---
kde4libs (4:4.13.3-0ubuntu0.4) trusty-security; urgency=medium

  * SECURITY UPDATE: information leak via crafted PAC file (LP: #1668871)
- debian/patches/CVE-2017-6410.patch: sanitize URLs in
  kio/misc/kpac/script.cpp.
- CVE-2017-6410

 -- Marc Deslauriers   Wed, 08 Mar 2017
10:25:45 -0500

** Changed in: kde4libs (Ubuntu Trusty)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1668871

Title:
  kio: Information Leak when accessing https when using a malicious PAC
  file

Status in kde4libs package in Ubuntu:
  Fix Released
Status in kio package in Ubuntu:
  Fix Released
Status in kde4libs source package in Trusty:
  Fix Released
Status in kde4libs source package in Xenial:
  Fix Released
Status in kio source package in Xenial:
  Fix Released
Status in kde4libs source package in Yakkety:
  Fix Released
Status in kio source package in Yakkety:
  Fix Released
Status in kde4libs source package in Zesty:
  Fix Released
Status in kio source package in Zesty:
  Fix Released

Bug description:
  KDE Project Security Advisory
  =

  Title:  kio: Information Leak when accessing https when using a 
malicious PAC file
  Risk Rating:Medium
  CVE:TBC
  Versions:   kio < 5.32, kdelibs < 4.14.30
  Date:   28 February 2017

  
  Overview
  
  Using a malicious PAC file, and then using exfiltration methods in the PAC
  function FindProxyForURL() enables the attacker to expose full https URLs.

  This is a security issue since https URLs may contain sensitive
  information in the URL authentication part (user:password@host), and in the
  path and the query (e.g. access tokens).

  This attack can be carried out remotely (over the LAN) since proxy settings
  allow “Detect Proxy Configuration Automatically”.
  This setting uses WPAD to retrieve the PAC file, and an attacker who has 
access
  to the victim’s LAN can interfere with the WPAD protocols (DHCP/DNS+HTTP)
  and inject his/her own malicious PAC instead of the legitimate one.

  Solution
  
  Update to kio >= 5.32 and kdelibs >= 4.14.30 (when released)

  Or apply the following patches:
  kio: https://commits.kde.org/kio/f9d0cb47cf94e209f6171ac0e8d774e68156a6e4
  kdelibs: 
https://commits.kde.org/kdelibs/1804c2fde7bf4e432c6cf5bb8cce5701c7010559

  Credits
  ===
  Thanks to Safebreach Labs researchers Itzik Kotler, Yonatan Fridburg
  and Amit Klein.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kde4libs/+bug/1668871/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp