DONATE (Why?)
paypal

KDE 3.2.1 Info Page

KDE 3.2.1 was released on March 9th, 2004. Read the official announcement.

This page is no longer maintained. Currently, only KDE 4.2.0 and newer are maintained. Please have a look at the KDE 4.4.0 Info Page instead.

Security Issues

Please report possible problems to security@kde.org.

Patches for the issues mentioned below are available from ftp://ftp.kde.org/pub/kde/security_patches unless stated otherwise.

  • The telnet, rlogin, ssh and mailto URI handlers in KDE do not check for '-' at the beginning of the hostname passed, which makes it possible to pass an option to the programs started by the handlers.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.2.2 are affected.
  • KDE fails to ensure the integrity of certain symlinks. This can be abused by a local attacker to create or truncate arbitrary files or to prevent KDE applications from functioning correctly.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.2.3 are affected.
  • KDE's DCOPServer creates temporary files in an insecure manner. Since the temporary files are used for authentication related purposes this can potentially allow a local attacker to compromise the account of any user which runs a KDE application.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.2.3 are affected.
  • The Konqueror webbrowser allows websites to load webpages into a frame of any other frame-based webpage that the user may have open.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.2.3 are affected.
  • Konqueror allows websites to set cookies for certain country specific secondary top level domains. (Cross-domain cookie injection)
    Read the detailed advisory. All versions of KDE up to and including KDE 3.2.3 are affected.
  • KPDF contains multiple integer overflow and integer arithmetic flaws that may make it possible to execute arbitrary code on the client machine via remotely supplied PDF files.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.3.1 are affected.
  • KDE may unexpectedly expose user provided passwords in certain cases, especially passwords for SMB shares.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.3.2 are affected.
  • KFax contains several vulnerabilities that may cause specially crafted fax files to trigger buffer overflows and execute arbitrary code.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.3.1 are affected.
    No source patches are available for this problem, users are advised to either remove KFax or to upgrade to KDE 3.3.2.
  • The Konqueror webbrowser allows websites to load webpages into a window or tab currently used by another website.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.3.2 are affected.
  • Two flaws in the Konqueror webbrowser make it possible to by pass the sandbox environment which is used to run Java-applets.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.3.1 are affected.
  • kpdf contains a buffer overflow in its xpdf-based code which can be triggered by a specially crafted pdf file.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.3.2 are affected.
  • ftp kioslave contains a vulnerability which allows to inject arbitrary ftp or smtp commands.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.3.2 are affected.
  • kpdf contains a buffer overflow in its xpdf-based code which can be triggered by a specially crafted pdf file.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.3.2 are affected.
  • A local user can lock up the dcopserver of arbitrary other users on the same machine by stalling the DCOP authentication process.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.3.2 are affected.
  • International Domain Name (IDN) support in Konqueror/KDE makes KDE vulnerable to a phishing technique known as a Homograph attack.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.3.2 are affected.
  • The dcopidlng script is vulnerable to symlink attacks, potentially allowing a local user to overwrite arbitrary files of a user when the script is run on behalf of that user. This only affects users who compile KDE or KDE applications themselves.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.3.2 are affected.
  • The Kate KPart (used by the applications kate and kwrite, possibly others) generates a backup file with default permissions upon saving. Depending on the setup, this could cause file content leak to local and remote (due to network transparency) users.
    Read the detailed advisory. KDE 3.2.x up to including KDE 3.4.0 are affected.
  • The langen2kvtml script (included in kdeedu/kvoctrain) contains multiple temp file generation vulnerabilities.
    Read the detailed advisory. KDE 3.0.x up to including KDE 3.4.2 are affected.
  • The kcheckpass utility contains on certain platforms a local root vulnerability.
    Read the detailed advisory. KDE 3.2.0 up to including KDE 3.4.2 are affected.
  • kpdf contains several buffer overflows in its xpdf-based code which can be triggered by a specially crafted pdf file.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.5.0 are affected.
  • kjs contains a heap based buffer overflow when decoding certain malcrafted utf8 uri sequences.
    Read the detailed advisory. All versions of KDE starting with KDE 3.2.0 up to and including KDE 3.5.0 are affected.
  • KDM contains a symlink attack vulnerability that allows a normal user to read files from other users including root.
    Read the detailed advisory. All versions of KDE starting with KDE 3.2.0 up to and including KDE 3.5.2 are affected.

Bugs

Please check the bug database before filing any bug reports. Also check for possible updates on this page that might describe or fix your problem.

FAQ

See the KDE FAQ for any specific questions you may have. Questions about Konqueror should be directed to the Konqueror FAQ and sound related questions are answered in the FAQ of the aRts Project

Download and Installation

Library Requirements. KDE 3.2 requires or benefits from the given list of libraries, most of which should be already installed on your system or available from your OS CD or your vendor's website.

The complete source code for KDE 3.2.1 is available for download:

Location Size MD5 Sum
arts-1.2.1 1020kB 84877632917893438c629803e7b004f3
kde-i18n-3.2.1 165MB 3e076e6074df8a5abb9bdb6542c017bc
kdeaccessibility-3.2.1 1.7MB 3a6215b9b3b7a1d7bb6e51863066a61e
kdeaddons-3.2.1 1.8MB c73c1777d3f5c25f46cd782fcca9fc35
kdeadmin-3.2.1 2.0MB 1ff46933b955cb4bc71cd533c6f730d1
kdeartwork-3.2.1 16MB 8c539b4ba4550e8355df03992c36cf58
kdebase-3.2.1 16MB 3a3d89b0b49dbb1eaa9e71c83019bbef
kdebindings-3.2.1 10MB d9bd456cb3896bf652a21c66a8f6260f
kdeedu-3.2.1 21MB e6eea40d3e26426e34f02bba8ffb72e2
kdegames-3.2.1 9.2MB 60b05fa22dfc0ec812ca88dacb0249aa
kdegraphics-3.2.1 5.9MB 5a1676b46efdd64be2f9e9604f04b176
kdelibs-3.2.1 12MB 50ae60072c1fc4ae4e41694bc2325dcb
kdemultimedia-3.2.1 5.2MB 6e03faa44ff7fdf60fd2fef0d23d5c43
kdenetwork-3.2.1 6.4MB c9135b09191624490590a014da4bfb3d
kdepim-3.2.1 7.9MB 362bec23869328a85845e0501020c938
kdesdk-3.2.1 4.2MB f52a69718705b32f0068fb605b604b45
kdetoys-3.2.1 2.8MB 217c8c2ddb4040abe13a719d6b18e807
kdeutils-3.2.1 2.9MB 152030a2912609997d73d7af0bb96d52
kdevelop-3.0.2 5.7MB 1c7df5b7abfc1981922f8a681ab93bb0
quanta-3.2.1 3.9MB 37990f042bdc48b6d0e9e714549ad3d7

The Konstruct build toolset can help you downloading and installing these tarballs.

Binary packages

Some Linux/UNIX OS vendors have kindly provided binary packages of KDE 3.2 for some versions of their distribution, and in other cases community volunteers have done so. Some of these binary packages are available for free download from KDE's http or FTP mirrors.

At the time of this release, pre-compiled packages are available for:

Additional binary packages might become available in the coming weeks, as well as updates to the current packages.

Developer Info

If you need help porting your application to KDE 3.x see the porting guide or subscribe to the KDE Devel Mailinglist to ask specific questions about porting your applications.

There is also info on the architecture and the programming interface of KDE 3.2.

Global navigation links