Lucene search

K
archlinuxArchLinuxASA-201802-4
HistoryFeb 09, 2018 - 12:00 a.m.

[ASA-201802-4] plasma-workspace: arbitrary command execution

2018-02-0900:00:00
security.archlinux.org
16

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

6.8

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

54.6%

Arch Linux Security Advisory ASA-201802-4

Severity: High
Date : 2018-02-09
CVE-ID : CVE-2018-6791
Package : plasma-workspace
Type : arbitrary command execution
Remote : No
Link : https://security.archlinux.org/AVG-607

Summary

The package plasma-workspace before version 5.12.0-1 is vulnerable to
arbitrary command execution.

Resolution

Upgrade to 5.12.0-1.

pacman -Syu “plasma-workspace>=5.12.0-1”

The problem has been fixed upstream in version 5.12.0.

Workaround

Mount removable devices with Dolphin instead of the device notifier.

Description

When a vfat thumbdrive which contains `` or $() in its volume label is
plugged and mounted trough the device notifier, it’s interpreted as a
shell command, leaving a possibility of arbitrary commands execution.
an example of offending volume label is “$(touch b)” which will create
a file called b in the home folder.

Impact

A local attacker is able to execute arbitrary commands on the affected
system by inserting and mounting a specially crafted thumbdrive.

References

https://www.kde.org/info/security/advisory-20180208-2.txt
https://security.archlinux.org/CVE-2018-6791

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanyplasma-workspace< 5.12.0-1UNKNOWN

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

6.8

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

54.6%