CVE-2015-1324
Publication date 21 May 2015
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Apport before 2.17.2-0ubuntu1.1 as packaged in Ubuntu 15.04, before 2.14.70ubuntu8.5 as packaged in Ubuntu 14.10, before 2.14.1-0ubuntu3.11 as packaged in Ubuntu 14.04 LTS, and before 2.0.1-0ubuntu17.9 as packaged in Ubuntu 12.04 LTS allow local users to write to arbitrary files and gain root privileges by leveraging incorrect handling of permissions when generating core dumps for setuid binaries.
Status
Package | Ubuntu Release | Status |
---|---|---|
apport | ||
16.04 LTS xenial |
Fixed 2.17.3-0ubuntu1
|
|
14.04 LTS trusty |
Fixed 2.14.1-0ubuntu3.11
|
|
Notes
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 · High |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-2609-1
- Apport vulnerabilities
- 21 May 2015