Debian DLA-1890-1 : kde4libs security update

high Nessus Plugin ID 127926

Synopsis

The remote Debian host is missing a security update.

Description

Dominik Penner discovered a flaw in how KConfig interpreted shell commands in desktop files and other configuration files. An attacker may trick users into installing specially crafted files which could then be used to execute arbitrary code, e.g. a file manager trying to find out the icon for a file or any application using KConfig. Thus the entire feature of supporting shell commands in KConfig entries has been removed.

For Debian 8 'Jessie', this problem has been fixed in version 4:4.14.2-5+deb8u3.

We recommend that you upgrade your kde4libs packages.

NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Upgrade the affected packages.

See Also

https://lists.debian.org/debian-lts-announce/2019/08/msg00023.html

https://packages.debian.org/source/jessie/kde4libs

Plugin Details

Severity: High

ID: 127926

File Name: debian_DLA-1890.nasl

Version: 1.5

Type: local

Agent: unix

Published: 8/20/2019

Updated: 5/2/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Temporal Score: 4

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2019-14744

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:libkfile4, p-cpe:/a:debian:debian_linux:libnepomuk4, p-cpe:/a:debian:debian_linux:libkrosscore4, p-cpe:/a:debian:debian_linux:kdelibs5-dbg, p-cpe:/a:debian:debian_linux:libknewstuff2-4, p-cpe:/a:debian:debian_linux:libthreadweaver4, p-cpe:/a:debian:debian_linux:libkrossui4, p-cpe:/a:debian:debian_linux:libkdeclarative5, p-cpe:/a:debian:debian_linux:libkcmutils4, p-cpe:/a:debian:debian_linux:libkprintutils4, p-cpe:/a:debian:debian_linux:kdelibs5-dev, p-cpe:/a:debian:debian_linux:libkdecore5, p-cpe:/a:debian:debian_linux:libkmediaplayer4, p-cpe:/a:debian:debian_linux:libkjsembed4, p-cpe:/a:debian:debian_linux:libplasma3, p-cpe:/a:debian:debian_linux:libkdewebkit5, p-cpe:/a:debian:debian_linux:libsolid4, p-cpe:/a:debian:debian_linux:libkjsapi4, p-cpe:/a:debian:debian_linux:libkdeui5, p-cpe:/a:debian:debian_linux:libkio5, p-cpe:/a:debian:debian_linux:libkdesu5, p-cpe:/a:debian:debian_linux:kdelibs5-data, p-cpe:/a:debian:debian_linux:libkemoticons4, p-cpe:/a:debian:debian_linux:libkhtml5, p-cpe:/a:debian:debian_linux:libktexteditor4, p-cpe:/a:debian:debian_linux:libkunitconversion4, p-cpe:/a:debian:debian_linux:libkde3support4, p-cpe:/a:debian:debian_linux:libkpty4, p-cpe:/a:debian:debian_linux:libkutils4, p-cpe:/a:debian:debian_linux:libkidletime4, p-cpe:/a:debian:debian_linux:kdelibs5-plugins, p-cpe:/a:debian:debian_linux:libknotifyconfig4, p-cpe:/a:debian:debian_linux:kdelibs-bin, p-cpe:/a:debian:debian_linux:libnepomukutils4, p-cpe:/a:debian:debian_linux:kdoctools, p-cpe:/a:debian:debian_linux:libkparts4, p-cpe:/a:debian:debian_linux:libknewstuff3-4, p-cpe:/a:debian:debian_linux:libnepomukquery4a, cpe:/o:debian:debian_linux:8.0, p-cpe:/a:debian:debian_linux:libkntlm4, p-cpe:/a:debian:debian_linux:libkimproxy4, p-cpe:/a:debian:debian_linux:libkdnssd4

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/18/2019

Vulnerability Publication Date: 8/7/2019

Reference Information

CVE: CVE-2019-14744