Description
KDE KAuth before 5.55 allows the passing of parameters with arbitrary types to helpers running as root over DBus via DBusHelperProxy.cpp. Certain types can cause crashes, and trigger the decoding of arbitrary images with dynamically loaded plugins. In other words, KAuth unintentionally causes this plugin code to run as root, which increases the severity of any possible exploitation of a plugin vulnerability.
Published: 2019-05-07
Score: 8.1 High
EPSS: 1.6% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-16985 KDE KAuth before 5.55 allows the passing of parameters with arbitrary types to helpers running as root over DBus via DBusHelperProxy.cpp. Certain types can cause crashes, and trigger the decoding of arbitrary images with dynamically loaded plugins. In other words, KAuth unintentionally causes this plugin code to run as root, which increases the severity of any possible exploitation of a plugin vulnerability.
Ubuntu USN Ubuntu USN USN-6035-1 KAuth vulnerability
History

No history.

Subscriptions

Fedoraproject Fedora
Kde Kauth
Opensuse Backports Leap
Suse Linux Enterprise
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T20:46:46.316Z

Reserved: 2019-02-05T00:00:00.000Z

Link: CVE-2019-7443

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-05-07T19:29:01.410

Modified: 2024-11-21T04:48:14.897

Link: CVE-2019-7443

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses