Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-3151

Опубликовано: 22 апр. 2015
Источник: redhat
CVSS2: 6.6

Описание

Directory traversal vulnerability in abrt-dbus in Automatic Bug Reporting Tool (ABRT) allows local users to read, write to, or change ownership of arbitrary files via unspecified vectors to the (1) NewProblem, (2) GetInfo, (3) SetElement, or (4) DeleteElement method.

Multiple directory traversal flaws were found in the abrt-dbus D-Bus service. A local attacker could use these flaws to read and write arbitrary files as the root user.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6abrtNot affected
Red Hat Enterprise Linux 7abrtFixedRHSA-2015:108309.06.2015
Red Hat Enterprise Linux 7libreportFixedRHSA-2015:108309.06.2015

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=1214451abrt: directory traversals in several D-Bus methods implemented by abrt-dbus

6.6 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.8
nvd
больше 5 лет назад

Directory traversal vulnerability in abrt-dbus in Automatic Bug Reporting Tool (ABRT) allows local users to read, write to, or change ownership of arbitrary files via unspecified vectors to the (1) NewProblem, (2) GetInfo, (3) SetElement, or (4) DeleteElement method.

CVSS3: 7.8
github
больше 3 лет назад

Directory traversal vulnerability in abrt-dbus in Automatic Bug Reporting Tool (ABRT) allows local users to read, write to, or change ownership of arbitrary files via unspecified vectors to the (1) NewProblem, (2) GetInfo, (3) SetElement, or (4) DeleteElement method.

oracle-oval
около 10 лет назад

ELSA-2015-1083: abrt security update (IMPORTANT)

6.6 Medium

CVSS2