USN-725-1: KMail vulnerability
26 February 2009
KMail vulnerability
Releases
Packages
- kdepim -
Details
It was discovered that Kmail did not adequately prevent execution of arbitrary
code when a user clicked on a URL to an executable within an HTML mail. If a
user clicked on a malicious URL and chose to execute the file, a remote
attacker could execute arbitrary code with user privileges. This update changes
KMail's behavior to instead launch a helper program to view the file if the
user chooses to execute such a link.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 8.10
Ubuntu 8.04
Ubuntu 7.10
Ubuntu 6.06
After a standard system upgrade you need to restart KMail to effect
the necessary changes.