In KDE Frameworks KConfig before 5.61.0, malicious desktop files and configuration files lead to code execution with minimal user interaction. This relates to libKF5ConfigCore.so, and the mishandling of .desktop and .directory files, as demonstrated by a shell command on an Icon line in a .desktop file.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
21 Nov 2024, 04:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00013.html - Mailing List, Patch, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00016.html - Mailing List, Patch, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00034.html - Mailing List, Third Party Advisory | |
References | () http://packetstormsecurity.com/files/153981/Slackware-Security-Advisory-kdelibs-Updates.html - Patch, Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHSA-2019:2606 - Third Party Advisory | |
References | () https://gist.githubusercontent.com/zeropwn/630832df151029cb8f22d5b6b9efaefb/raw/64aa3d30279acb207f787ce9c135eefd5e52643b/kde-kdesktopfile-command-injection.txt - Exploit, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2019/08/msg00023.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5IRIKH7ZWXELIQT6WSLV7EG3VTFWKZPD/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNHO6FZRYBQ2R3UCFDGS66F6DNNTKCMM/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UYKLUSSEK3YJOVQDL6K2LKGS3354UH6L/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WTFBQRJAU7ITD3TOMPZAUQMYYCAZ6DTX/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YIDXQ6CUB5E7Y3MJWCUY4VR42QAE6SCJ/ - | |
References | () https://seclists.org/bugtraq/2019/Aug/12 - Mailing List, Third Party Advisory | |
References | () https://seclists.org/bugtraq/2019/Aug/9 - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201908-07 - Third Party Advisory | |
References | () https://usn.ubuntu.com/4100-1/ - Third Party Advisory | |
References | () https://www.debian.org/security/2019/dsa-4494 - Third Party Advisory | |
References | () https://www.zdnet.com/article/unpatched-kde-vulnerability-disclosed-on-twitter/ - Press/Media Coverage, Third Party Advisory |
Information
Published : 2019-08-07 15:15
Updated : 2024-11-21 04:27
NVD link : CVE-2019-14744
Mitre link : CVE-2019-14744
CVE.ORG link : CVE-2019-14744
JSON object : View
Products Affected
kde
- kconfig
redhat
- enterprise_linux_desktop
- enterprise_linux_server
- enterprise_linux_workstation
opensuse
- backports_sle
fedoraproject
- fedora
canonical
- ubuntu_linux
debian
- debian_linux
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')