Rapid7 Vulnerability & Exploit Database

FreeBSD: VID-C71ED065-0600-11EB-8758-E0D55E2A8BF9 (CVE-2020-26164): kdeconnect -- packet manipulation can be exploited in a Denial of Service attack

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

FreeBSD: VID-C71ED065-0600-11EB-8758-E0D55E2A8BF9 (CVE-2020-26164): kdeconnect -- packet manipulation can be exploited in a Denial of Service attack

Severity
5
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:C)
Published
10/02/2020
Created
10/07/2020
Added
10/05/2020
Modified
10/22/2020

Description

Details for this vulnerability have not been published by NIST at this point. Descriptions from software vendor advisories for this issue are provided below.

From VID-C71ED065-0600-11EB-8758-E0D55E2A8BF9:

Albert Astals Cid reports:

KDE Project Security Advisory

Title

KDE Connect: packet manipulation can be exploited in a Denial of Service attack

Risk Rating

Important

CVE

CVE-2020-26164

Versions

kdeconnect <= 20.08.1

Author

Albert Vaca Cintora <albertvaka@gmail.com>

Date

2 October 2020

Overview

An attacker on your local network could send maliciously crafted

packets to other hosts running kdeconnect on the network, causing

them to use large amounts of CPU, memory or network connections,

which could be used in a Denial of Service attack within the

network.

Impact

Computers that run kdeconnect are susceptible to DoS attacks from

the local network.

Workaround

We advise you to stop KDE Connect when on untrusted networks like

those on airports or conferences.

Since kdeconnect is dbus activated it is relatively hard to make

sure it stays stopped so the brute force approach is to uninstall

the kdeconnect package from your system and then run

kquitapp5 kdeconnectd

Just install the package again once you're back in a trusted

network.

Solution

KDE Connect 20.08.2 patches several code paths that could result

in a DoS.

You can apply these patches on top of 20.08.1:

https://invent.kde.org/network/kdeconnect-kde/-/commit/f183b5447bad47655c21af87214579f03bf3a163

https://invent.kde.org/network/kdeconnect-kde/-/commit/b279c52101d3f7cc30a26086d58de0b5f1c547fa

https://invent.kde.org/network/kdeconnect-kde/-/commit/d35b88c1b25fe13715f9170f18674d476ca9acdc

https://invent.kde.org/network/kdeconnect-kde/-/commit/b496e66899e5bc9547b6537a7f44ab44dd0aaf38

https://invent.kde.org/network/kdeconnect-kde/-/commit/5310eae85dbdf92fba30375238a2481f2e34943e

https://invent.kde.org/network/kdeconnect-kde/-/commit/721ba9faafb79aac73973410ee1dd3624ded97a5

https://invent.kde.org/network/kdeconnect-kde/-/commit/ae58b9dec49c809b85b5404cee17946116f8a706

https://invent.kde.org/network/kdeconnect-kde/-/commit/66c768aa9e7fba30b119c8b801efd49ed1270b0a

https://invent.kde.org/network/kdeconnect-kde/-/commit/85b691e40f525e22ca5cc4ebe79c361d71d7dc05

https://invent.kde.org/network/kdeconnect-kde/-/commit/48180b46552d40729a36b7431e97bbe2b5379306

Credits

Thanks Matthias Gerstner and the openSUSE security team for

reporting the issue.

Thanks to Aleix Pol, Nicolas Fella and Albert Vaca Cintora for the

patches.

Solution(s)

  • freebsd-upgrade-package-kdeconnect-kde

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;