CVE-2004-0411

N/A Unknown
Published: July 07, 2004 Modified: April 16, 2026
View on NVD

Description

The URI handlers in Konqueror for KDE 3.2.2 and earlier do not properly filter "-" characters that begin a hostname in a (1) telnet, (2) rlogin, (3) ssh, or (4) mailto URI, which allows remote attackers to manipulate the options that are passed to the associated programs, possibly to read arbitrary files or execute arbitrary code.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://marc.info/?l=bugtraq&m=108481412427344&w=2
Source: cve@mitre.org
Mailing List Third Party Advisory
http://secunia.com/advisories/11602
Source: cve@mitre.org
Broken Link
http://security.gentoo.org/glsa/glsa-200405-11.xml
Source: cve@mitre.org
Third Party Advisory
http://www.ciac.org/ciac/bulletins/o-146.shtml
Source: cve@mitre.org
Broken Link
http://www.debian.org/security/2004/dsa-518
Source: cve@mitre.org
Third Party Advisory
http://www.kde.org/info/security/advisory-20040517-1.txt
Source: cve@mitre.org
Patch Vendor Advisory
http://www.osvdb.org/6107
Source: cve@mitre.org
Broken Link
http://www.securityfocus.com/advisories/6717
Source: cve@mitre.org
Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/advisories/6743
Source: cve@mitre.org
Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/363225
Source: cve@mitre.org
Broken Link Third Party Advisory VDB Entry Vendor Advisory
http://www.securityfocus.com/bid/10358
Source: cve@mitre.org
Broken Link Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/16163
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000843
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://marc.info/?l=bugtraq&m=108481412427344&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://secunia.com/advisories/11602
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://security.gentoo.org/glsa/glsa-200405-11.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ciac.org/ciac/bulletins/o-146.shtml
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.debian.org/security/2004/dsa-518
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.kde.org/info/security/advisory-20040517-1.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.novell.com/linux/security/advisories/2004_14_kdelibs.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.osvdb.org/6107
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2004-222.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.securityfocus.com/advisories/6717
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/advisories/6743
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/363225
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry Vendor Advisory
http://www.securityfocus.com/bid/10358
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/16163
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A954
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Tool Signature

34 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
6.5%
91th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

kde