Описание
An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads the CrashDB field and it then evaluates the field as Python code if it begins with a "{". This allows remote attackers to execute arbitrary Python code.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 2.20.4-0ubuntu1 |
| esm-infra-legacy/trusty | released | 2.14.1-0ubuntu3.23 |
| esm-infra/xenial | released | 2.20.1-0ubuntu2.4 |
| precise | not-affected | |
| precise/esm | DNE | precise was not-affected |
| trusty | released | 2.14.1-0ubuntu3.23 |
| trusty/esm | released | 2.14.1-0ubuntu3.23 |
| upstream | needs-triage | |
| vivid/stable-phone-overlay | ignored | end of life |
| vivid/ubuntu-core | DNE |
Показывать по
9.3 Critical
CVSS2
7.8 High
CVSS3
Связанные уязвимости
An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads the CrashDB field and it then evaluates the field as Python code if it begins with a "{". This allows remote attackers to execute arbitrary Python code.
An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads the CrashDB field and it then evaluates the field as Python code if it begins with a "{". This allows remote attackers to execute arbitrary Python code.
9.3 Critical
CVSS2
7.8 High
CVSS3