Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-11481

Опубликовано: 08 фев. 2020
Источник: nvd
CVSS3: 3.8
CVSS3: 7.8
CVSS2: 6.1
EPSS Низкий

Описание

Kevin Backhouse discovered that apport would read a user-supplied configuration file with elevated privileges. By replacing the file with a symbolic link, a user could get apport to read any file on the system as root, with unknown consequences.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
Конфигурация 2
cpe:2.3:a:apport_project:apport:-:*:*:*:*:*:*:*

EPSS

Процентиль: 33%
0.00133
Низкий

3.8 Low

CVSS3

7.8 High

CVSS3

6.1 Medium

CVSS2

Дефекты

CWE-59

Связанные уязвимости

CVSS3: 3.8
ubuntu
почти 6 лет назад

Kevin Backhouse discovered that apport would read a user-supplied configuration file with elevated privileges. By replacing the file with a symbolic link, a user could get apport to read any file on the system as root, with unknown consequences.

CVSS3: 7.8
github
больше 3 лет назад

Kevin Backhouse discovered that apport would read a user-supplied configuration file with elevated privileges. By replacing the file with a symbolic link, a user could get apport to read any file on the system as root, with unknown consequences.

CVSS3: 7.8
fstec
почти 6 лет назад

Уязвимость службы регистрации ошибок apport операционной системы Ubuntu, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 33%
0.00133
Низкий

3.8 Low

CVSS3

7.8 High

CVSS3

6.1 Medium

CVSS2

Дефекты

CWE-59