KTextEditor における認可・権限・アクセス制御に関する脆弱性
| Title |
KTextEditor における認可・権限・アクセス制御に関する脆弱性
|
| Summary |
KTextEditor には、認可・権限・アクセス制御に関する脆弱性が存在します。
|
| Possible impacts |
情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution |
ベンダ情報および参考情報を参照して適切な対策を実施してください。 |
| Publication Date |
April 24, 2018, midnight |
| Registration Date |
June 22, 2018, 3:09 p.m. |
| Last Update |
June 22, 2018, 3:09 p.m. |
|
CVSS3.0 : 重要
|
| Score |
7.8
|
| Vector |
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
CVSS2.0 : 危険
|
| Score |
7.2
|
| Vector |
AV:L/AC:L/Au:N/C:C/I:C/A:C |
Affected System
| KDE project |
|
KTextEditor 5.34.0 から 5.45.0
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
| No |
Changed Details |
Date of change |
| 1 |
[2018年06月22日] 掲載 |
June 22, 2018, 3:09 p.m. |
NVD Vulnerability Information
CVE-2018-10361
| Summary |
An issue was discovered in KTextEditor 5.34.0 through 5.45.0. Insecure handling of temporary files in the KTextEditor's kauth_ktexteditor_helper service (as utilized in the Kate text editor) can allow other unprivileged users on the local system to gain root privileges. The attack occurs when one user (who has an unprivileged account but is also able to authenticate as root) writes a text file using Kate into a directory owned by a another unprivileged user. The latter unprivileged user conducts a symlink attack to achieve privilege escalation.
|
| Publication Date |
April 25, 2018, 2:29 p.m. |
| Registration Date |
March 1, 2021, 6:42 p.m. |
| Last Update |
Nov. 21, 2024, 12:41 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:kde:ktexteditor:*:*:*:*:*:*:*:* |
5.34.0 |
5.45.0 |
|
|
Related information, measures and tools
Common Vulnerabilities List