Skip to content

KDE 3.2.2 Info Page

KDE 3.2.2 was released on April 19th, 2004. Read the official announcement.

Security Issues

Please report possible problems to security@kde.org.

Patches for the issues mentioned below are available from ftp://ftp.kde.org/pub/kde/security_patches unless stated otherwise.

  • The telnet, rlogin, ssh and mailto URI handlers in KDE do not check for '-' at the beginning of the hostname passed, which makes it possible to pass an option to the programs started by the handlers.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.2.2 are affected.
  • KDE fails to ensure the integrity of certain symlinks. This can be abused by a local attacker to create or truncate arbitrary files or to prevent KDE applications from functioning correctly.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.2.3 are affected.
  • KDE's DCOPServer creates temporary files in an insecure manner. Since the temporary files are used for authentication related purposes this can potentially allow a local attacker to compromise the account of any user which runs a KDE application.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.2.3 are affected.
  • The Konqueror webbrowser allows websites to load webpages into a frame of any other frame-based webpage that the user may have open.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.2.3 are affected.
  • Konqueror allows websites to set cookies for certain country specific secondary top level domains. (Cross-domain cookie injection)
    Read the detailed advisory. All versions of KDE up to and including KDE 3.2.3 are affected.
  • KPDF contains multiple integer overflow and integer arithmetic flaws that may make it possible to execute arbitrary code on the client machine via remotely supplied PDF files.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.3.1 are affected.
  • KDE may unexpectedly expose user provided passwords in certain cases, especially passwords for SMB shares.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.3.2 are affected.
  • KFax contains several vulnerabilities that may cause specially crafted fax files to trigger buffer overflows and execute arbitrary code.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.3.1 are affected.
    No source patches are available for this problem, users are advised to either remove KFax or to upgrade to KDE 3.3.2.
  • The Konqueror webbrowser allows websites to load webpages into a window or tab currently used by another website.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.3.2 are affected.
  • Two flaws in the Konqueror webbrowser make it possible to by pass the sandbox environment which is used to run Java-applets.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.3.1 are affected.
  • kpdf contains a buffer overflow in its xpdf-based code which can be triggered by a specially crafted pdf file.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.3.2 are affected.
  • ftp kioslave contains a vulnerability which allows to inject arbitrary ftp or smtp commands.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.3.2 are affected.
  • kpdf contains a buffer overflow in its xpdf-based code which can be triggered by a specially crafted pdf file.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.3.2 are affected.
  • A local user can lock up the dcopserver of arbitrary other users on the same machine by stalling the DCOP authentication process.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.3.2 are affected.
  • International Domain Name (IDN) support in Konqueror/KDE makes KDE vulnerable to a phishing technique known as a Homograph attack.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.3.2 are affected.
  • The dcopidlng script is vulnerable to symlink attacks, potentially allowing a local user to overwrite arbitrary files of a user when the script is run on behalf of that user. This only affects users who compile KDE or KDE applications themselves.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.3.2 are affected.
  • The Kate KPart (used by the applications kate and kwrite, possibly others) generates a backup file with default permissions upon saving. Depending on the setup, this could cause file content leak to local and remote (due to network transparency) users.
    Read the detailed advisory. KDE 3.2.x up to including KDE 3.4.0 are affected.
  • The langen2kvtml script (included in kdeedu/kvoctrain) contains multiple temp file generation vulnerabilities.
    Read the detailed advisory. KDE 3.0.x up to including KDE 3.4.2 are affected.
  • The kcheckpass utility contains on certain platforms a local root vulnerability.
    Read the detailed advisory. KDE 3.2.0 up to including KDE 3.4.2 are affected.
  • kpdf contains several buffer overflows in its xpdf-based code which can be triggered by a specially crafted pdf file.
    Read the detailed advisory. All versions of KDE up to and including KDE 3.5.0 are affected.
  • kjs contains a heap based buffer overflow when decoding certain malcrafted utf8 uri sequences.
    Read the detailed advisory. All versions of KDE starting with KDE 3.2.0 up to and including KDE 3.5.0 are affected.
  • KDM contains a symlink attack vulnerability that allows a normal user to read files from other users including root.
    Read the detailed advisory. All versions of KDE starting with KDE 3.2.0 up to and including KDE 3.5.2 are affected.

Bugs

This is a list of grave bugs and common pitfalls surfacing after the release date:

Please check the bug database before filing any bug reports. Also check for possible updates on this page that might describe or fix your problem.

FAQ

See the KDE FAQ for any specific questions you may have. Questions about Konqueror should be directed to the Konqueror FAQ and sound related questions are answered in the FAQ of the aRts Project

Download and Installation

Library Requirements. KDE 3.2 requires or benefits from the given list of libraries, most of which should be already installed on your system or available from your OS CD or your vendor's website.

The complete source code for KDE 3.2.2 is available for download:

LocationSizeMD5 Sum
arts-1.2.2956kB83ca7e7a33c55de34e12bfc360190795
kdeaccessibility-3.2.21.7MB26179a0315123a72949a5981f5d4beb3
kdeaddons-3.2.21.7MB294edc0b59a23ae5a9e3a3664e677b2f
kdeadmin-3.2.21.9MB4a39ce0d9abdd2dccb4531466ee7f229
kdeartwork-3.2.216MBcc2b1f2116c998387ea4ea998720934a
kdebase-3.2.216MB81a348e01625f77beeb53755cb28ba85
kdebindings-3.2.210MB5c00277c009ea97e7ca70c613f5fc87b
kdeedu-3.2.221MB97174178360396ea50e69097979b8319
kdegames-3.2.29.2MB714f8a591964c11af5bdb228cee750e6
kdegraphics-3.2.25.9MBd74038c154a5ecd924a50b57d4c79c43
kde-i18n-3.2.2141MB3de328fcce5fb1f90b9489e4f36fa33d
kdelibs-3.2.212MB76c656fb4ec7f1ca073f52fad2b8898b
kdemultimedia-3.2.25.1MB062249563cbf66d77e61b41e5126f806
kdenetwork-3.2.26.3MB405ade1938cd74e3e9643f25814ee81d
kdepim-3.2.27.8MB10249b56cbc4c67dc4093b9f968604b9
kdesdk-3.2.24.2MBdd3c690444fef79de620c26abfaafd37
kdetoys-3.2.22.7MB8db947ef275b7eb255a4448baca419d9
kdeutils-3.2.22.9MB94eee311b04f91aa083d1f8a8620faca
kdevelop-3.0.36.1MBc362e32f793f30ba4cedcdc0a914328d
quanta-3.2.23.8MB2cdd52e44839e4456c8809a73bf96493

The Konstruct build toolset can help you downloading and installing these tarballs.

Binary packages

Some Linux/UNIX OS vendors have kindly provided binary packages of KDE 3.2 for some versions of their distribution, and in other cases community volunteers have done so. Some of these binary packages are available for free download from KDE's http or FTP mirrors.

At the time of this release, pre-compiled packages are available for:

Additional binary packages might become available in the coming weeks, as well as updates to the current packages.

Developer Info

If you need help porting your application to KDE 3.x see the porting guide or subscribe to the KDE Devel Mailinglist to ask specific questions about porting your applications.

There is also info on the architecture and the programming interface of KDE 3.2.