Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2018-10361

Опубликовано: 25 апр. 2018
Источник: nvd
CVSS3: 7.8
CVSS2: 7.2
EPSS Низкий

Описание

An issue was discovered in KTextEditor 5.34.0 through 5.45.0. Insecure handling of temporary files in the KTextEditor's kauth_ktexteditor_helper service (as utilized in the Kate text editor) can allow other unprivileged users on the local system to gain root privileges. The attack occurs when one user (who has an unprivileged account but is also able to authenticate as root) writes a text file using Kate into a directory owned by a another unprivileged user. The latter unprivileged user conducts a symlink attack to achieve privilege escalation.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:kde:ktexteditor:*:*:*:*:*:*:*:*
Версия от 5.34.0 (включая) до 5.45.0 (включая)

EPSS

Процентиль: 13%
0.00043
Низкий

7.8 High

CVSS3

7.2 High

CVSS2

Дефекты

CWE-668

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 8 лет назад

An issue was discovered in KTextEditor 5.34.0 through 5.45.0. Insecure handling of temporary files in the KTextEditor's kauth_ktexteditor_helper service (as utilized in the Kate text editor) can allow other unprivileged users on the local system to gain root privileges. The attack occurs when one user (who has an unprivileged account but is also able to authenticate as root) writes a text file using Kate into a directory owned by a another unprivileged user. The latter unprivileged user conducts a symlink attack to achieve privilege escalation.

CVSS3: 7.8
debian
почти 8 лет назад

An issue was discovered in KTextEditor 5.34.0 through 5.45.0. Insecure ...

CVSS3: 7.8
github
больше 3 лет назад

An issue was discovered in KTextEditor 5.34.0 through 5.45.0. Insecure handling of temporary files in the KTextEditor's kauth_ktexteditor_helper service (as utilized in the Kate text editor) can allow other unprivileged users on the local system to gain root privileges. The attack occurs when one user (who has an unprivileged account but is also able to authenticate as root) writes a text file using Kate into a directory owned by a another unprivileged user. The latter unprivileged user conducts a symlink attack to achieve privilege escalation.

EPSS

Процентиль: 13%
0.00043
Низкий

7.8 High

CVSS3

7.2 High

CVSS2

Дефекты

CWE-668