CVE-2004-1491

Opera 7.54 and earlier uses kfmclient exec to handle unknown MIME types, which allows remote attackers to execute arbitrary code via a shortcut or launcher that contains an Exec entry.
References
Link Resource
http://lists.suse.com/archive/suse-security-announce/2005-Mar/0007.html Third Party Advisory Vendor Advisory
http://secunia.com/advisories/13447/ Broken Link Patch
http://www.gentoo.org/security/en/glsa/glsa-200502-17.xml Patch Third Party Advisory Vendor Advisory
http://www.opera.com/linux/changelogs/754u2/ Broken Link
http://www.securityfocus.com/bid/11901 Broken Link Patch Third Party Advisory VDB Entry
http://www.zone-h.org/advisories/read/id=6503 Third Party Advisory Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/18457 Third Party Advisory VDB Entry
http://lists.suse.com/archive/suse-security-announce/2005-Mar/0007.html Third Party Advisory Vendor Advisory
http://secunia.com/advisories/13447/ Broken Link Patch
http://www.gentoo.org/security/en/glsa/glsa-200502-17.xml Patch Third Party Advisory Vendor Advisory
http://www.opera.com/linux/changelogs/754u2/ Broken Link
http://www.securityfocus.com/bid/11901 Broken Link Patch Third Party Advisory VDB Entry
http://www.zone-h.org/advisories/read/id=6503 Third Party Advisory Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/18457 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:2.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:3.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:4.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:4.2:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:4.3:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:4.4:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:4.4.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:5.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:5.2:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:5.3:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:6.1:alpha:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:6.3:alpha:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:6.4:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:6.4:alpha:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:7.0:alpha:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:7.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:7.1:alpha:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:7.2:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:7.3:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*

History

20 Nov 2024, 23:51

Type Values Removed Values Added
References () http://lists.suse.com/archive/suse-security-announce/2005-Mar/0007.html - Third Party Advisory, Vendor Advisory () http://lists.suse.com/archive/suse-security-announce/2005-Mar/0007.html - Third Party Advisory, Vendor Advisory
References () http://secunia.com/advisories/13447/ - Broken Link, Patch () http://secunia.com/advisories/13447/ - Broken Link, Patch
References () http://www.gentoo.org/security/en/glsa/glsa-200502-17.xml - Patch, Third Party Advisory, Vendor Advisory () http://www.gentoo.org/security/en/glsa/glsa-200502-17.xml - Patch, Third Party Advisory, Vendor Advisory
References () http://www.opera.com/linux/changelogs/754u2/ - Broken Link () http://www.opera.com/linux/changelogs/754u2/ - Broken Link
References () http://www.securityfocus.com/bid/11901 - Broken Link, Patch, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/11901 - Broken Link, Patch, Third Party Advisory, VDB Entry
References () http://www.zone-h.org/advisories/read/id=6503 - Third Party Advisory, Vendor Advisory () http://www.zone-h.org/advisories/read/id=6503 - Third Party Advisory, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/18457 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/18457 - Third Party Advisory, VDB Entry

Information

Published : 2004-12-31 05:00

Updated : 2024-11-20 23:51


NVD link : CVE-2004-1491

Mitre link : CVE-2004-1491

CVE.ORG link : CVE-2004-1491


JSON object : View

Products Affected

kde

  • kde

opera

  • opera_browser

suse

  • suse_linux

gentoo

  • linux