New! Vulnerability Priority Rating (VPR)
Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.
VPR Score: 3.6
Synopsis
The remote FreeBSD host is missing a security-related update.
Description
Albert Astals Cid reports : KDE Project Security AdvisoryTitleKDE Connect: packet manipulation can be exploited in a Denial of Service attackRisk RatingImportantCVECVE-2020-26164Versionskdeconnect <= 20.08.1AuthorAlbert Vaca Cintora <[email protected]>Date2 October 2020Overview
An attacker on your local network could send maliciously crafted packets to other hosts running kdeconnect on the network, causing them to use large amounts of CPU, memory or network connections, which could be used in a Denial of Service attack within the network.
Impact
Computers that run kdeconnect are susceptible to DoS attacks from the local network.
Workaround
We advise you to stop KDE Connect when on untrusted networks like those on airports or conferences.
Since kdeconnect is dbus activated it is relatively hard to make sure it stays stopped so the brute force approach is to uninstall the kdeconnect package from your system and then run
kquitapp5 kdeconnectd
Just install the package again once you're back in a trusted network.
Solution
KDE Connect 20.08.2 patches several code paths that could result in a DoS.
You can apply these patches on top of 20.08.1 :
- https://invent.kde.org/network/kdeconnect-kde/-/commit/f183b5447bad476 55c21af87214579f03bf3a163
- https://invent.kde.org/network/kdeconnect-kde/-/commit/b279c52101d3f7c c30a26086d58de0b5f1c547fa
- https://invent.kde.org/network/kdeconnect-kde/-/commit/d35b88c1b25fe13 715f9170f18674d476ca9acdc
- https://invent.kde.org/network/kdeconnect-kde/-/commit/b496e66899e5bc9 547b6537a7f44ab44dd0aaf38
- https://invent.kde.org/network/kdeconnect-kde/-/commit/5310eae85dbdf92 fba30375238a2481f2e34943e
- https://invent.kde.org/network/kdeconnect-kde/-/commit/721ba9faafb79aa c73973410ee1dd3624ded97a5
- https://invent.kde.org/network/kdeconnect-kde/-/commit/ae58b9dec49c809 b85b5404cee17946116f8a706
- https://invent.kde.org/network/kdeconnect-kde/-/commit/66c768aa9e7fba3 0b119c8b801efd49ed1270b0a
- https://invent.kde.org/network/kdeconnect-kde/-/commit/85b691e40f525e2 2ca5cc4ebe79c361d71d7dc05
- https://invent.kde.org/network/kdeconnect-kde/-/commit/48180b46552d407 29a36b7431e97bbe2b5379306
Credits
Thanks Matthias Gerstner and the openSUSE security team for reporting the issue.
Thanks to Aleix Pol, Nicolas Fella and Albert Vaca Cintora for the patches.
Solution
Update the affected package.