7.2
CVSSv2

CVE-2017-8422

Published: 17/05/2017 Updated: 03/10/2019
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 725
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

KDE kdelibs prior to 4.14.32 and KAuth prior to 5.34 allow local users to gain root privileges by spoofing a callerID and leveraging a privileged helper app.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

kde kauth

kde kdelibs

Vendor Advisories

Synopsis Important: kdelibs security update Type/Severity Security Advisory: Important Topic An update for kdelibs is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base score, ...
KDE-Libs could be made to run programs as an administrator if it received specially crafted input ...
A privilege escalation flaw was found in the way kdelibs handled D-Bus messages A local user could potentially use this flaw to gain root privileges by spoofing a callerID and leveraging a privileged helper application ...
KAuth <= 5330 contains a logic flaw in which the service invoking dbus is not properly checked This allows spoofing the identity of the caller and with some carefully crafted calls can lead to gaining root from an unprivileged account ...

Exploits

// cc -Wall smb0kc -pedantic -std=c11 // // smb4k PoC, also demonstrating broader scope of a generic kde // authentication bypass vulnerability // // (C) 2017 Sebastian Krahmer // #define _POSIX_C_SOURCE 200112L #include <stdioh> #include <fcntlh> #include <unistdh> #include <stdlibh> #include <errnoh> #include ...

Github Repositories

PLASMA PULSAR

PLASMA PULSAR CVE-2017-8422, CVE-2017-8849 This document describes a generic root exploit against kde The exploit is achieved by abusing a logic flaw within the KAuth framework which is present in kde4 (orgkdeauth) and kde5 (orgkdekf5auth) It is possible to spoof what KAuth calls callerID's which are indeed D-Bus unique names of the sender of a D-Bus message Exploit