Reportedly, the implementation of the rlogin and telnet protocols, by KDE's KIO subsystem, are prone to a remote command execution vulnerability. An attacker can exploit this vulnerability by using a carefully crafted URL in a KIO-enabled application to execute arbitrary commands on the vulnerable system. Any commands executed in this manner will be executed on the victim user's account with the privileges of the victim user. This vulnerability can also be exploited by using a carefully crafted URL in a HTML page or in a HTML email.
Reportedly, the implementation of the rlogin and telnet protocols, by KDE's KIO subsystem, are prone to a remote command execution vulnerability. An attacker can exploit this vulnerability by using a carefully crafted URL in a KIO-enabled application to execute arbitrary commands on the vulnerable system. Any commands executed in this manner will be executed on the victim user's account with the privileges of the victim user. This vulnerability can also be exploited by using a carefully crafted URL in a HTML page or in a HTML email.