Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2017-8422
Deferred
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-17 May, 2017 | 14:29
Updated At-20 Apr, 2025 | 01:37

KDE kdelibs before 4.14.32 and KAuth before 5.34 allow local users to gain root privileges by spoofing a callerID and leveraging a privileged helper app.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.07.8HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Primary2.07.2HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

KDE
kde
>>kauth>>Versions up to 5.33(inclusive)
cpe:2.3:a:kde:kauth:*:*:*:*:*:*:*:*
KDE
kde
>>kdelibs>>Versions up to 4.14.31(inclusive)
cpe:2.3:a:kde:kdelibs:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-290Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.debian.org/security/2017/dsa-3849cve@mitre.org
N/A
http://www.openwall.com/lists/oss-security/2017/05/10/3cve@mitre.org
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/98412cve@mitre.org
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1038480cve@mitre.org
N/A
https://access.redhat.com/errata/RHSA-2017:1264cve@mitre.org
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=1449647cve@mitre.org
Issue Tracking
Patch
https://cgit.kde.org/kauth.git/commit/?id=df875f725293af53399f5146362eb158b4f9216acve@mitre.org
Patch
https://cgit.kde.org/kdelibs.git/commit/?id=264e97625abe2e0334f97de17f6ffb52582888abcve@mitre.org
Patch
https://security.gentoo.org/glsa/201706-29cve@mitre.org
N/A
https://www.exploit-db.com/exploits/42053/cve@mitre.org
N/A
https://www.kde.org/info/security/advisory-20170510-1.txtcve@mitre.org
Patch
Vendor Advisory
http://www.debian.org/security/2017/dsa-3849af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.openwall.com/lists/oss-security/2017/05/10/3af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/98412af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1038480af854a3a-2127-422b-91ae-364da2661108
N/A
https://access.redhat.com/errata/RHSA-2017:1264af854a3a-2127-422b-91ae-364da2661108
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=1449647af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Patch
https://cgit.kde.org/kauth.git/commit/?id=df875f725293af53399f5146362eb158b4f9216aaf854a3a-2127-422b-91ae-364da2661108
Patch
https://cgit.kde.org/kdelibs.git/commit/?id=264e97625abe2e0334f97de17f6ffb52582888abaf854a3a-2127-422b-91ae-364da2661108
Patch
https://security.gentoo.org/glsa/201706-29af854a3a-2127-422b-91ae-364da2661108
N/A
https://www.exploit-db.com/exploits/42053/af854a3a-2127-422b-91ae-364da2661108
N/A
https://www.kde.org/info/security/advisory-20170510-1.txtaf854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
Change History
0Changes found

Details not found