First published: Tue May 07 2019(Updated: )
KDE KAuth before 5.55 allows the passing of parameters with arbitrary types to helpers running as root over DBus via DBusHelperProxy.cpp. Certain types can cause crashes, and trigger the decoding of arbitrary images with dynamically loaded plugins. In other words, KAuth unintentionally causes this plugin code to run as root, which increases the severity of any possible exploitation of a plugin vulnerability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
KDE KAuth | <5.55.0 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =42.3 | |
Opensuse Backports | ||
SUSE Linux Enterprise | =15.0 | |
Fedoraproject Fedora | =28 | |
Fedoraproject Fedora | =29 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2019-7443.
CVE-2019-7443 has a severity level of critical (8.1).
CVE-2019-7443 affects KDE KAuth versions up to and excluding 5.55.0.
This vulnerability can be exploited by passing parameters with arbitrary types to helpers running as root over DBus via DBusHelperProxy.cpp.
Yes, updating KDE KAuth to version 5.55.0 or higher is the recommended fix for this vulnerability.