7.2
CVSSv2

CVE-2017-8849

Published: 17/05/2017 Updated: 18/03/2019
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 725
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

smb4k prior to 2.0.1 allows local users to gain root privileges by leveraging failure to verify arguments to the mount helper DBUS service.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

smb4k project smb4k

debian debian linux 8.0

Vendor Advisories

Debian Bug report logs - #862505 smb4k: CVE-2017-8849 Package: src:smb4k; Maintainer for src:smb4k is Debian KDE Extras Team <pkg-kde-extras@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 13 May 2017 18:45:02 UTC Severity: important Tags: patch, security, upstream Found in ...
Sebastian Krahmer discovered that a programming error in the mount helper binary of the Smb4k Samba network share browser may result in local privilege escalation For the oldstable distribution (jessie), this problem has been fixed in version 121-2~deb8u1 We recommend that you upgrade your smb4k packages ...
Smb4k <= 200 contains a logic flaw in which mount helper binary does not properly verify the mount command it is being asked to run This allows calling any other binary as root since the mount helper is typically installed as suid ...

Exploits

// cc -Wall smb0kc -pedantic -std=c11 // // smb4k PoC, also demonstrating broader scope of a generic kde // authentication bypass vulnerability // // (C) 2017 Sebastian Krahmer // #define _POSIX_C_SOURCE 200112L #include <stdioh> #include <fcntlh> #include <unistdh> #include <stdlibh> #include <errnoh> #include ...

Github Repositories

PLASMA PULSAR

PLASMA PULSAR CVE-2017-8422, CVE-2017-8849 This document describes a generic root exploit against kde The exploit is achieved by abusing a logic flaw within the KAuth framework which is present in kde4 (orgkdeauth) and kde5 (orgkdekf5auth) It is possible to spoof what KAuth calls callerID's which are indeed D-Bus unique names of the sender of a D-Bus message Exploit