Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-27187

Опубликовано: 26 окт. 2020
Источник: ubuntu
Приоритет: medium
CVSS2: 7.2
CVSS3: 7.8

Описание

An issue was discovered in KDE Partition Manager 4.1.0 before 4.2.0. The kpmcore_externalcommand helper contains a logic flaw in which the service invoking D-Bus is not properly checked. An attacker on the local machine can replace /etc/fstab, and execute mount and other partitioning related commands, while KDE Partition Manager is running. the mount command can then be used to gain full root privileges.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

4.2.0-2
esm-apps/bionic

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

not-affected

4.2.0-2
esm-apps/noble

not-affected

4.2.0-2
esm-infra-legacy/trusty

DNE

focal

ignored

end of standard support, was needs-triage
groovy

ignored

end of life
hirsute

not-affected

4.2.0-2

Показывать по

7.2 High

CVSS2

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
nvd
больше 5 лет назад

An issue was discovered in KDE Partition Manager 4.1.0 before 4.2.0. The kpmcore_externalcommand helper contains a logic flaw in which the service invoking D-Bus is not properly checked. An attacker on the local machine can replace /etc/fstab, and execute mount and other partitioning related commands, while KDE Partition Manager is running. the mount command can then be used to gain full root privileges.

CVSS3: 7.8
debian
больше 5 лет назад

An issue was discovered in KDE Partition Manager 4.1.0 before 4.2.0. T ...

CVSS3: 7.8
github
больше 3 лет назад

An issue was discovered in KDE Partition Manager 4.1.0 before 4.2.0. The kpmcore_externalcommand helper contains a logic flaw in which the service invoking D-Bus is not properly checked. An attacker on the local machine can replace /etc/fstab, and execute mount and other partitioning related commands, while KDE Partition Manager is running. the mount command can then be used to gain full root privileges.

7.2 High

CVSS2

7.8 High

CVSS3