Lucene search

K
cve[email protected]CVE-2019-7443
HistoryMay 07, 2019 - 7:29 p.m.

CVE-2019-7443

2019-05-0719:29:01
CWE-20
web.nvd.nist.gov
108
cve-2019-7443
kde
kauth
nvd
vulnerability
dbus
root access
security issue

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

7.9 High

AI Score

Confidence

High

0.007 Low

EPSS

Percentile

80.2%

KDE KAuth before 5.55 allows the passing of parameters with arbitrary types to helpers running as root over DBus via DBusHelperProxy.cpp. Certain types can cause crashes, and trigger the decoding of arbitrary images with dynamically loaded plugins. In other words, KAuth unintentionally causes this plugin code to run as root, which increases the severity of any possible exploitation of a plugin vulnerability.

Affected configurations

NVD
Node
kdekauthRange<5.55.0
Node
opensuseleapMatch15.0
OR
opensuseleapMatch42.3
Node
opensusebackportsMatch-
AND
suselinux_enterpriseMatch15.0
Node
fedoraprojectfedoraMatch28
OR
fedoraprojectfedoraMatch29
CPENameOperatorVersion
kde:kauthkde kauthlt5.55.0

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

7.9 High

AI Score

Confidence

High

0.007 Low

EPSS

Percentile

80.2%