Description
Apport through 2.20.7 does not properly handle core dumps from setuid binaries allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1324.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-5687 | Apport through 2.20.7 does not properly handle core dumps from setuid binaries allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1324. |
Ubuntu USN |
USN-3480-1 | Apport vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2024-09-17T00:15:35.899Z
Reserved: 2017-09-07T00:00:00.000Z
Link: CVE-2017-14177
No data.
Status : Modified
Published: 2018-02-02T14:29:00.263
Modified: 2024-11-21T03:12:18.367
Link: CVE-2017-14177
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN