CVE-2019-14744

7.8 HIGH

📋 TL;DR

CVE-2019-14744 is a code execution vulnerability in KDE Frameworks KConfig where malicious .desktop or .directory files can execute arbitrary shell commands when processed. This affects KDE desktop environments and applications using KConfig before version 5.61.0. Users who open or interact with crafted desktop files are vulnerable.

💻 Affected Systems

Products:
  • KDE Frameworks KConfig
  • KDE Plasma Desktop
  • Applications using KConfig
Versions: Versions before 5.61.0
Operating Systems: Linux distributions with KDE (openSUSE, Fedora, Ubuntu KDE, etc.)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all default KDE configurations that process .desktop or .directory files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining user-level privileges and potentially escalating to root through subsequent exploits.

🟠

Likely Case

Local privilege escalation or arbitrary code execution when user opens malicious desktop file.

🟢

If Mitigated

No impact if patched or if desktop files from untrusted sources are blocked.

🌐 Internet-Facing: LOW - Requires user interaction with malicious files, not directly network exploitable.
🏢 Internal Only: MEDIUM - Internal users could craft malicious desktop files for lateral movement or privilege escalation.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user to open malicious desktop file. Proof of concept involves crafted Icon line with shell commands.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: KDE Frameworks 5.61.0 or later

Vendor Advisory: https://access.redhat.com/errata/RHSA-2019:2606

Restart Required: Yes

Instructions:

1. Update KDE Frameworks to version 5.61.0 or later using your distribution's package manager. 2. Restart KDE desktop session or affected applications. 3. For distributions: Apply security updates from vendor repositories.

🔧 Temporary Workarounds

Disable desktop file execution

linux

Configure system to not execute shell commands from desktop files

echo 'No direct command available - requires KConfig configuration changes'

Restrict desktop file sources

linux

Only allow desktop files from trusted sources

chmod 644 ~/.local/share/applications/*.desktop
chown root:root /usr/share/applications/*.desktop

🧯 If You Can't Patch

  • Restrict user permissions to create/modify desktop files in shared directories
  • Implement application whitelisting to prevent execution of unknown desktop applications

🔍 How to Verify

Check if Vulnerable:

Check KDE Frameworks version: dpkg -l | grep libkf5config-core or rpm -qa | grep kf5-kconfig-core

Check Version:

kf5-config --version | grep -i config

Verify Fix Applied:

Verify version is 5.61.0 or higher: kf5-config --version | grep KConfig

📡 Detection & Monitoring

Log Indicators:

  • Unusual desktop file executions
  • Shell commands originating from desktop file processing

Network Indicators:

  • None - local exploitation only

SIEM Query:

process.name: "kdeinit*" AND cmdline: "*.desktop" AND cmdline: "sh -c"

🔗 References

📤 Share & Export