In KDE Frameworks KConfig before 5.61.0, malicious desktop files and configuration files lead to code execution with minimal user interaction. This relates to libKF5ConfigCore.so, and the mishandling of .desktop and .directory files, as demonstrated by a shell command on an Icon line in a .desktop file.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
21 Nov 2024, 04:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00013.html - Mailing List, Patch, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00016.html - Mailing List, Patch, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00034.html - Mailing List, Third Party Advisory | |
References | () http://packetstormsecurity.com/files/153981/Slackware-Security-Advisory-kdelibs-Updates.html - Patch, Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHSA-2019:2606 - Third Party Advisory | |
References | () https://gist.githubusercontent.com/zeropwn/630832df151029cb8f22d5b6b9efaefb/raw/64aa3d30279acb207f787ce9c135eefd5e52643b/kde-kdesktopfile-command-injection.txt - Exploit, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2019/08/msg00023.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5IRIKH7ZWXELIQT6WSLV7EG3VTFWKZPD/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNHO6FZRYBQ2R3UCFDGS66F6DNNTKCMM/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UYKLUSSEK3YJOVQDL6K2LKGS3354UH6L/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WTFBQRJAU7ITD3TOMPZAUQMYYCAZ6DTX/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YIDXQ6CUB5E7Y3MJWCUY4VR42QAE6SCJ/ - | |
References | () https://seclists.org/bugtraq/2019/Aug/12 - Mailing List, Third Party Advisory | |
References | () https://seclists.org/bugtraq/2019/Aug/9 - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201908-07 - Third Party Advisory | |
References | () https://usn.ubuntu.com/4100-1/ - Third Party Advisory | |
References | () https://www.debian.org/security/2019/dsa-4494 - Third Party Advisory | |
References | () https://www.zdnet.com/article/unpatched-kde-vulnerability-disclosed-on-twitter/ - Press/Media Coverage, Third Party Advisory |
07 Nov 2023, 03:05
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2019-08-07 15:15
Updated : 2024-11-21 04:27
NVD link : CVE-2019-14744
Mitre link : CVE-2019-14744
CVE.ORG link : CVE-2019-14744
JSON object : View
Products Affected
canonical
- ubuntu_linux
opensuse
- backports_sle
fedoraproject
- fedora
kde
- kconfig
debian
- debian_linux
redhat
- enterprise_linux_desktop
- enterprise_linux_workstation
- enterprise_linux_server
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')