Lucene search

K
gentooGentoo FoundationGLSA-201512-12
HistoryDec 30, 2015 - 12:00 a.m.

KDE Systemsettings: Privilege escalation

2015-12-3000:00:00
Gentoo Foundation
security.gentoo.org
9

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.2%

Background

KDE workspace configuration module for setting the date and time has a helper program which runs as root for performing actions.

Description

KDE Systemsettings fails to properly validate user input before passing it as argument in context of higher privilege.

Impact

A local attacker could gain privileges via a crafted ntpUtility (ntp utility name) argument.

Workaround

Add a polkit rule to disable the org.kde.kcontrol.kcmclock.save action.

Resolution

All KDE Systemsettings users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose
 ">=kde-base/systemsettings-4.11.13-r1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallkde-base/systemsettings< 4.11.13-r1UNKNOWN

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.2%