CVE-2018-6791
CVSS7.2
发布时间 :2018-02-06 21:29:01
修订时间 :2018-03-13 12:23:47
NMP    

[原文]An issue was discovered in soliduiserver/deviceserviceaction.cpp in KDE Plasma Workspace before 5.12.0. When a vfat thumbdrive that contains `` or $() in its volume label is plugged in and mounted through the device notifier, it's interpreted as a shell command, leading to a possibility of arbitrary command execution. An example of an offending volume label is "$(touch b)" -- this will create a file called b in the home folder.


[CNNVD]CNNVD数据暂缺。


[机译]译文暂缺.

- CVSS (基础分值)

CVSS分值: 7.2 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-77 [在命令中使用的特殊元素转义处理不恰当(命令注入)]

- CPE (受影响的平台与产品)

cpe:/a:kde:plasma-workspace:5.1
cpe:/a:kde:plasma-workspace:5.4.3
cpe:/o:debian:debian_linux:9.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6791
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-6791
(官方数据源) NVD

- 其它链接及资源

https://bugs.kde.org/show_bug.cgi?id=389815
(VENDOR_ADVISORY)  CONFIRM  https://bugs.kde.org/show_bug.cgi?id=389815
https://cgit.kde.org/plasma-workspace.git/commit/?id=9db872df82c258315c6ebad800af59e81ffb9212
(VENDOR_ADVISORY)  CONFIRM  https://cgit.kde.org/plasma-workspace.git/commit/?id=9db872df82c258315c6ebad800af59e81ffb9212
https://www.debian.org/security/2018/dsa-4116
(VENDOR_ADVISORY)  DEBIAN  DSA-4116

- 漏洞信息 (F146806)

Gentoo Linux Security Advisory 201803-09 (PacketStormID:F146806)
2018-03-20 00:00:00
Gentoo  security.gentoo.org
advisory,arbitrary,local,vulnerability
linux,gentoo
CVE-2018-6790,CVE-2018-6791
[点击下载]

Gentoo Linux Security Advisory 201803-9 - Multiple vulnerabilities have been found in KDE Plasma Workspaces, the worst of which allows local attackers to execute arbitrary commands. Versions less than 5.11.5-r1 are affected.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 201803-09
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                           https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
    Title: KDE Plasma Workspaces: Multiple vulnerabilities
     Date: March 19, 2018
     Bugs: #647106
       ID: 201803-09

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

Multiple vulnerabilities have been found in KDE Plasma Workspaces, the
worst of which allows local attackers to execute arbitrary commands.

Background
==========

KDE Plasma workspace is a widget based desktop environment designed to
be fast and efficient.

Affected packages
=================

    -------------------------------------------------------------------
     Package              /     Vulnerable     /            Unaffected
    -------------------------------------------------------------------
  1  kde-plasma/plasma-workspace
                                < 5.11.5-r1              >= 5.11.5-r1 

Description
===========

Multiple vulnerabilities have been discovered in KDE Plasma Workspaces.
Please review the referenced CVE identifiers for details.

Impact
======

An attacker could execute arbitrary commands via specially crafted
thumb drive's volume labels or obtain sensitive information via
specially crafted notifications.

Workaround
==========

Users should mount removable devices with Dolphin instead of the device
notifier.

Users should disable notifications.

Resolution
==========

All KDE Plasma Workspace users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot -v ">=kde-plasma/plasma-workspace-5.11.5-r1"

References
==========

[ 1 ] CVE-2018-6790
      https://nvd.nist.gov/vuln/detail/CVE-2018-6790
[ 2 ] CVE-2018-6791
      https://nvd.nist.gov/vuln/detail/CVE-2018-6791

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201803-09

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2018 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5
    
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站