CVE-2018-10361

EUVD-2018-2435
An issue was discovered in KTextEditor 5.34.0 through 5.45.0. Insecure handling of temporary files in the KTextEditor's kauth_ktexteditor_helper service (as utilized in the Kate text editor) can allow other unprivileged users on the local system to gain root privileges. The attack occurs when one user (who has an unprivileged account but is also able to authenticate as root) writes a text file using Kate into a directory owned by a another unprivileged user. The latter unprivileged user conducts a symlink attack to achieve privilege escalation.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 13%
Affected Products (NVD)
VendorProductVersion
kdektexteditor
5.34.0 ≤
𝑥
≤ 5.45.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ktexteditor
bookworm
5.103.0-1.1
fixed
bullseye
5.78.0-3
fixed
sid
5.115.0-3
fixed
stretch
not-affected
trixie
5.115.0-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ktexteditor
artful
ignored
bionic
needed
cosmic
ignored
disco
ignored
eoan
not-affected
focal
not-affected
groovy
not-affected
hirsute
not-affected
impish
not-affected
jammy
not-affected
kinetic
not-affected
lunar
not-affected
mantic
not-affected
noble
not-affected
trusty
dne
xenial
not-affected