Page 5 of 26 results (0.010 seconds)

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0

Apport 2.13 through 2.20.7 does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges, a different vulnerability than CVE-2017-14179. Apport 2.13 hasta la versión 2.20.7 no gestiona adecuadamente los cierres inesperados provenientes de un espacio de nombre PID, lo que permite que los usuarios locales creen ciertos archivos como root. Un atacante podría aprovechar estos archivos para realizar una denegación de servicio (DoS) mediante el agotamiento de recursos o, posiblemente, obtener privilegios root. Esta vulnerabilidad es diferente de CVE-2017-14179. • https://bazaar.launchpad.net/~apport-hackers/apport/trunk/revision/3171 https://launchpad.net/bugs/1726372 https://people.canonical.com/~ubuntu-security/cve/?cve=CVE-2017-14180 https://usn.ubuntu.com/usn/usn-3480-1 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0

Apport through 2.20.7 does not properly handle core dumps from setuid binaries allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1324. Apport, hasta la versión 2.20.7, no gestiona adecuadamente lo volcados de núcleo de binarios setuid, lo que permite que los usuarios locales creen ciertos archivos como root. Un atacante podría aprovechar estos archivos para realizar una denegación de servicio (DoS) mediante el agotamiento de recursos o, posiblemente, obtener privilegios root. NOTA: Esta vulnerabilidad existe debido a una solución incompleta para CVE-2015-1324. • https://bazaar.launchpad.net/~apport-hackers/apport/trunk/revision/3171 https://launchpad.net/bugs/1726372 https://people.canonical.com/~ubuntu-security/cve/?cve=CVE-2017-14177 https://usn.ubuntu.com/usn/usn-3480-1 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in Apport through 2.20.x. In apport/report.py, Apport sets the ExecutablePath field and it then uses the path to run package specific hooks without protecting against path traversal. This allows remote attackers to execute arbitrary code via a crafted .crash file. Fue detectado un problema en Apport hasta la versión 2.20.x. En el archivo apport/report.py, Apport establece el campo ExecutablePath y, a entonces, usa la ruta (path) de acceso para ejecutar enlaces específicos del paquete sin proteger contra el salto de ruta (path) de acceso. • https://launchpad.net/bugs/1700573 https://launchpad.net/ubuntu/+source/apport/+changelog • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.3EPSS: 0%CPEs: 2EXPL: 2

An issue was discovered in Apport before 2.20.4. There is a path traversal issue in the Apport crash file "Package" and "SourcePackage" fields. These fields are used to build a path to the package specific hook files in the /usr/share/apport/package-hooks/ directory. An attacker can exploit this path traversal to execute arbitrary Python files from the local system. Un problema fue descubierto en Apport en versiones anteriores a 2.20.4. • https://www.exploit-db.com/exploits/40937 http://www.securityfocus.com/bid/95011 http://www.ubuntu.com/usn/USN-3157-1 https://bugs.launchpad.net/apport/+bug/1648806 https://donncha.is/2016/12/compromising-ubuntu-desktop https://github.com/DonnchaC/ubuntu-apport-exploitation • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 2

An issue was discovered in Apport before 2.20.4. A malicious Apport crash file can contain a restart command in `RespawnCommand` or `ProcCmdline` fields. This command will be executed if a user clicks the Relaunch button on the Apport prompt from the malicious crash file. The fix is to only show the Relaunch button on Apport crash files generated by local systems. The Relaunch button will be hidden when crash files are opened directly in Apport-GTK. • https://www.exploit-db.com/exploits/40937 http://www.securityfocus.com/bid/95011 http://www.ubuntu.com/usn/USN-3157-1 https://bugs.launchpad.net/apport/+bug/1648806 https://donncha.is/2016/12/compromising-ubuntu-desktop https://github.com/DonnchaC/ubuntu-apport-exploitation • CWE-284: Improper Access Control •