9.3
CVSSv2

CVE-2019-7443

Published: 07/05/2019 Updated: 07/11/2023
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.1 | Impact Score: 5.9 | Exploitability Score: 2.2
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

KDE KAuth prior to 5.55 allows the passing of parameters with arbitrary types to helpers running as root over DBus via DBusHelperProxy.cpp. Certain types can cause crashes, and trigger the decoding of arbitrary images with dynamically loaded plugins. In other words, KAuth unintentionally causes this plugin code to run as root, which increases the severity of any possible exploitation of a plugin vulnerability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

kde kauth

opensuse leap 42.3

opensuse leap 15.0

opensuse backports -

fedoraproject fedora 28

fedoraproject fedora 29

Vendor Advisories

Debian Bug report logs - #921995 kauth: Insecure handling of arguments in helpers Package: src:kauth; Maintainer for src:kauth is Debian/Kubuntu Qt/KDE Maintainers <debian-qt-kde@listsdebianorg>; Reported by: Scott Kitterman <debian@kittermancom> Date: Mon, 11 Feb 2019 04:21:02 UTC Severity: grave Tags: patch, sec ...