CVE-2019-14744
📋 TL;DR
CVE-2019-14744 is a code execution vulnerability in KDE Frameworks KConfig where malicious .desktop or .directory files can execute arbitrary shell commands when processed. This affects KDE desktop environments and applications using KConfig before version 5.61.0. Users who open or interact with crafted desktop files are vulnerable.
💻 Affected Systems
- KDE Frameworks KConfig
- KDE Plasma Desktop
- Applications using KConfig
📦 What is this software?
Backports Sle by Opensuse
Fedora by Fedoraproject
Fedora by Fedoraproject
Ubuntu Linux by Canonical
Ubuntu Linux by Canonical
Ubuntu Linux by Canonical
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with attacker gaining user-level privileges and potentially escalating to root through subsequent exploits.
Likely Case
Local privilege escalation or arbitrary code execution when user opens malicious desktop file.
If Mitigated
No impact if patched or if desktop files from untrusted sources are blocked.
🎯 Exploit Status
Exploitation requires user to open malicious desktop file. Proof of concept involves crafted Icon line with shell commands.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: KDE Frameworks 5.61.0 or later
Vendor Advisory: https://access.redhat.com/errata/RHSA-2019:2606
Restart Required: Yes
Instructions:
1. Update KDE Frameworks to version 5.61.0 or later using your distribution's package manager. 2. Restart KDE desktop session or affected applications. 3. For distributions: Apply security updates from vendor repositories.
🔧 Temporary Workarounds
Disable desktop file execution
linuxConfigure system to not execute shell commands from desktop files
echo 'No direct command available - requires KConfig configuration changes'
Restrict desktop file sources
linuxOnly allow desktop files from trusted sources
chmod 644 ~/.local/share/applications/*.desktop
chown root:root /usr/share/applications/*.desktop
🧯 If You Can't Patch
- Restrict user permissions to create/modify desktop files in shared directories
- Implement application whitelisting to prevent execution of unknown desktop applications
🔍 How to Verify
Check if Vulnerable:
Check KDE Frameworks version: dpkg -l | grep libkf5config-core or rpm -qa | grep kf5-kconfig-core
Check Version:
kf5-config --version | grep -i config
Verify Fix Applied:
Verify version is 5.61.0 or higher: kf5-config --version | grep KConfig
📡 Detection & Monitoring
Log Indicators:
- Unusual desktop file executions
- Shell commands originating from desktop file processing
Network Indicators:
- None - local exploitation only
SIEM Query:
process.name: "kdeinit*" AND cmdline: "*.desktop" AND cmdline: "sh -c"
🔗 References
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00034.html
- http://packetstormsecurity.com/files/153981/Slackware-Security-Advisory-kdelibs-Updates.html
- https://access.redhat.com/errata/RHSA-2019:2606
- https://gist.githubusercontent.com/zeropwn/630832df151029cb8f22d5b6b9efaefb/raw/64aa3d30279acb207f787ce9c135eefd5e52643b/kde-kdesktopfile-command-injection.txt
- https://lists.debian.org/debian-lts-announce/2019/08/msg00023.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5IRIKH7ZWXELIQT6WSLV7EG3VTFWKZPD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNHO6FZRYBQ2R3UCFDGS66F6DNNTKCMM/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UYKLUSSEK3YJOVQDL6K2LKGS3354UH6L/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WTFBQRJAU7ITD3TOMPZAUQMYYCAZ6DTX/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YIDXQ6CUB5E7Y3MJWCUY4VR42QAE6SCJ/
- https://seclists.org/bugtraq/2019/Aug/12
- https://seclists.org/bugtraq/2019/Aug/9
- https://security.gentoo.org/glsa/201908-07
- https://usn.ubuntu.com/4100-1/
- https://www.debian.org/security/2019/dsa-4494
- https://www.zdnet.com/article/unpatched-kde-vulnerability-disclosed-on-twitter/
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00034.html
- http://packetstormsecurity.com/files/153981/Slackware-Security-Advisory-kdelibs-Updates.html
- https://access.redhat.com/errata/RHSA-2019:2606
- https://gist.githubusercontent.com/zeropwn/630832df151029cb8f22d5b6b9efaefb/raw/64aa3d30279acb207f787ce9c135eefd5e52643b/kde-kdesktopfile-command-injection.txt
- https://lists.debian.org/debian-lts-announce/2019/08/msg00023.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5IRIKH7ZWXELIQT6WSLV7EG3VTFWKZPD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNHO6FZRYBQ2R3UCFDGS66F6DNNTKCMM/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UYKLUSSEK3YJOVQDL6K2LKGS3354UH6L/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WTFBQRJAU7ITD3TOMPZAUQMYYCAZ6DTX/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YIDXQ6CUB5E7Y3MJWCUY4VR42QAE6SCJ/
- https://seclists.org/bugtraq/2019/Aug/12
- https://seclists.org/bugtraq/2019/Aug/9
- https://security.gentoo.org/glsa/201908-07
- https://usn.ubuntu.com/4100-1/
- https://www.debian.org/security/2019/dsa-4494
- https://www.zdnet.com/article/unpatched-kde-vulnerability-disclosed-on-twitter/