Skip to content

KDE 3.2 Info Page

KDE 3.2 was released on February 3rd, 2004. Read the official announcement.

Security Issues

Please report possible problems to security@kde.org.

Patches for the issues mentioned below are available from ftp://ftp.kde.org/pub/kde/security_patches unless stated otherwise.

  • The telnet, rlogin, ssh and mailto URI handlers in KDE do not check for '-' at the beginning of the hostname passed, which makes it possible to pass an option to the programs started by the handlers.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.2.2 are affected.
  • KDE fails to ensure the integrity of certain symlinks. This can be abused by a local attacker to create or truncate arbitrary files or to prevent KDE applications from functioning correctly.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.2.3 are affected.
  • KDE's DCOPServer creates temporary files in an insecure manner. Since the temporary files are used for authentication related purposes this can potentially allow a local attacker to compromise the account of any user which runs a KDE application.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.2.3 are affected.
  • The Konqueror webbrowser allows websites to load webpages into a frame of any other frame-based webpage that the user may have open.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.2.3 are affected.
  • Konqueror allows websites to set cookies for certain country specific secondary top level domains. (Cross-domain cookie injection)
    Read the detailed advisory. All versions of KDE up to and including KDE 3.2.3 are affected.
  • KPDF contains multiple integer overflow and integer arithmetic flaws that may make it possible to execute arbitrary code on the client machine via remotely supplied PDF files.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.3.1 are affected.
  • KDE may unexpectedly expose user provided passwords in certain cases, especially passwords for SMB shares.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.3.2 are affected.
  • KFax contains several vulnerabilities that may cause specially crafted fax files to trigger buffer overflows and execute arbitrary code.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.3.1 are affected.
    No source patches are available for this problem, users are advised to either remove KFax or to upgrade to KDE 3.3.2.
  • The Konqueror webbrowser allows websites to load webpages into a window or tab currently used by another website.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.3.2 are affected.
  • Two flaws in the Konqueror webbrowser make it possible to by pass the sandbox environment which is used to run Java-applets.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.3.1 are affected.
  • kpdf contains a buffer overflow in its xpdf-based code which can be triggered by a specially crafted pdf file.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.3.2 are affected.
  • ftp kioslave contains a vulnerability which allows to inject arbitrary ftp or smtp commands.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.3.2 are affected.
  • kpdf contains a buffer overflow in its xpdf-based code which can be triggered by a specially crafted pdf file.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.3.2 are affected.
  • A local user can lock up the dcopserver of arbitrary other users on the same machine by stalling the DCOP authentication process.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.3.2 are affected.
  • International Domain Name (IDN) support in Konqueror/KDE makes KDE vulnerable to a phishing technique known as a Homograph attack.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.3.2 are affected.
  • The dcopidlng script is vulnerable to symlink attacks, potentially allowing a local user to overwrite arbitrary files of a user when the script is run on behalf of that user. This only affects users who compile KDE or KDE applications themselves.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.3.2 are affected.
  • The Kate KPart (used by the applications kate and kwrite, possibly others) generates a backup file with default permissions upon saving. Depending on the setup, this could cause file content leak to local and remote (due to network transparency) users.
    Read the detailed advisory. KDE 3.2.x up to including KDE 3.4.0 are affected.
  • The langen2kvtml script (included in kdeedu/kvoctrain) contains multiple temp file generation vulnerabilities.
    Read the detailed advisory. KDE 3.0.x up to including KDE 3.4.2 are affected.
  • The kcheckpass utility contains on certain platforms a local root vulnerability.
    Read the detailed advisory. KDE 3.2.0 up to including KDE 3.4.2 are affected.
  • kpdf contains several buffer overflows in its xpdf-based code which can be triggered by a specially crafted pdf file.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.5.0 are affected.
  • kjs contains a heap based buffer overflow when decoding certain malcrafted utf8 uri sequences.
    Read the detailed advisory. All versions of KDE starting with KDE 3.2.0 up to and including KDE 3.5.0 are affected.
  • KDM contains a symlink attack vulnerability that allows a normal user to read files from other users including root.
    Read the detailed advisory. All versions of KDE starting with KDE 3.2.0 up to and including KDE 3.5.2 are affected.

Bugs

This is a list of grave bugs and common pitfalls surfacing after the release date:

  • Two problems with KMail were detected which can lead to mail loss: Patch

Please check the bug database before filing any bug reports. Also check for possible updates on this page that might describe or fix your problem.

FAQ

See the KDE FAQ for any specific questions you may have. Questions about Konqueror should be directed to the Konqueror FAQ and sound related questions are answered in the FAQ of the aRts Project

Download and Installation

Library Requirements. KDE 3.2 requires or benefits from the given list of libraries, most of which should be already installed on your system or available from your OS CD or your vendor's website.

The complete source code for KDE 3.2 is available for download:

LocationSizeMD5 Sum
arts-1.2.0976kBf17708ad3c91b0a2f0c83674f78c3e53
kde-i18n-3.2.0157MB13299c38d4acb77ae4edf759b327c1ab
kdeaccessibility-3.2.01.6MB97466b78dcee2d29505937c79919713d
kdeaddons-3.2.01.7MBe61991c52aa6b76dec0790e76eb889bd
kdeadmin-3.2.01.9MBb24ec2e71edcd0157d84821729cae2b2
kdeartwork-3.2.016MB882a798e09e9529f102599d24bb7daee
kdebase-3.2.017MB9d05be3ccd6cc0294d6153e5d4dfa63a
kdebindings-3.2.010MBb5721cec8c94bc4a3712e6c7c73934a5
kdeedu-3.2.021MBa0a59713a19fb01dd62b13b92f222d08
kdegames-3.2.09.1MB30af752fbe3547a30963bf0df0380c24
kdegraphics-3.2.05.9MB675dd4f557574097b911350cc47f0843
kdelibs-3.2.012MB24be0d558725f4d3441fb9d580129720
kdemultimedia-3.2.05.1MBcaa8578190d032acd3c8fa996cf9585a
kdenetwork-3.2.06.3MB80d5a03ac950a7fac10bacbb122db11f
kdepim-3.2.07.8MB657a61e0f3d90d2afec3820e77f81306
kdesdk-3.2.04.1MB170baf93150c231605bec047d49d0742
kdetoys-3.2.02.7MBb9fdd2b51a25501322e3dd3301760a41
kdeutils-3.2.02.9MB988480b534c1fab9003f624edb87e7a7
kdevelop-3.0.05.2MBfa823d9fa2444938ecafb97949500c27
quanta-3.2.03.9MB77f2e92edd4caf70703b7274a461ef42

The Konstruct build toolset can help you downloading and installing these tarballs.

Binary packages

Some Linux/UNIX OS vendors have kindly provided binary packages of KDE 3.2 for some versions of their distribution, and in other cases community volunteers have done so. Some of these binary packages are available for free download from KDE's http or FTP mirrors.

At the time of this release, pre-compiled packages are available for:

Additional binary packages might become available in the coming weeks, as well as updates to the current packages.

Developer Info

If you need help porting your application to KDE 3.x see the porting guide or subscribe to the KDE Devel Mailinglist to ask specific questions about porting your applications.

There is also info on the architecture and the programming interface of KDE 3.2.