Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-7443

Опубликовано: 07 мая 2019
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 9.3
CVSS3: 8.1

Описание

KDE KAuth before 5.55 allows the passing of parameters with arbitrary types to helpers running as root over DBus via DBusHelperProxy.cpp. Certain types can cause crashes, and trigger the decoding of arbitrary images with dynamically loaded plugins. In other words, KAuth unintentionally causes this plugin code to run as root, which increases the severity of any possible exploitation of a plugin vulnerability.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
cosmic

ignored

end of life
devel

not-affected

5.98.0-0ubuntu1
disco

ignored

end of life
eoan

ignored

end of life
esm-apps/bionic

released

5.44.0-0ubuntu1+esm1
esm-apps/focal

not-affected

5.68.0-0ubuntu1
esm-apps/jammy

not-affected

5.92.0
esm-apps/xenial

released

5.18.0-0ubuntu2+esm1
esm-infra-legacy/trusty

DNE

Показывать по

EPSS

Процентиль: 82%
0.01661
Низкий

9.3 Critical

CVSS2

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.1
nvd
больше 6 лет назад

KDE KAuth before 5.55 allows the passing of parameters with arbitrary types to helpers running as root over DBus via DBusHelperProxy.cpp. Certain types can cause crashes, and trigger the decoding of arbitrary images with dynamically loaded plugins. In other words, KAuth unintentionally causes this plugin code to run as root, which increases the severity of any possible exploitation of a plugin vulnerability.

CVSS3: 8.1
debian
больше 6 лет назад

KDE KAuth before 5.55 allows the passing of parameters with arbitrary ...

suse-cvrf
почти 7 лет назад

Security update for kauth

CVSS3: 8.1
github
больше 3 лет назад

KDE KAuth before 5.55 allows the passing of parameters with arbitrary types to helpers running as root over DBus via DBusHelperProxy.cpp. Certain types can cause crashes, and trigger the decoding of arbitrary images with dynamically loaded plugins. In other words, KAuth unintentionally causes this plugin code to run as root, which increases the severity of any possible exploitation of a plugin vulnerability.

EPSS

Процентиль: 82%
0.01661
Низкий

9.3 Critical

CVSS2

8.1 High

CVSS3