Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-7307

Опубликовано: 29 авг. 2019
Источник: ubuntu
Приоритет: medium
CVSS2: 4.4
CVSS3: 7

Описание

Apport before versions 2.14.1-0ubuntu3.29+esm1, 2.20.1-0ubuntu2.19, 2.20.9-0ubuntu7.7, 2.20.10-0ubuntu27.1, 2.20.11-0ubuntu5 contained a TOCTTOU vulnerability when reading the users ~/.apport-ignore.xml file, which allows a local attacker to replace this file with a symlink to any other file on the system and so cause Apport to include the contents of this other file in the resulting crash report. The crash report could then be read by that user either by causing it to be uploaded and reported to Launchpad, or by leveraging some other vulnerability to read the resulting crash report, and so allow the user to read arbitrary files on the system.

РелизСтатусПримечание
bionic

released

2.20.9-0ubuntu7.7
cosmic

released

2.20.10-0ubuntu13.4
devel

released

2.20.11-0ubuntu5
disco

released

2.20.10-0ubuntu27.1
esm-infra-legacy/trusty

released

2.14.1-0ubuntu3.29+esm1
esm-infra/bionic

released

2.20.9-0ubuntu7.7
esm-infra/xenial

released

2.20.1-0ubuntu2.19
precise/esm

DNE

trusty/esm

released

2.14.1-0ubuntu3.29+esm1
upstream

needs-triage

Показывать по

4.4 Medium

CVSS2

7 High

CVSS3

Связанные уязвимости

CVSS3: 7
nvd
больше 6 лет назад

Apport before versions 2.14.1-0ubuntu3.29+esm1, 2.20.1-0ubuntu2.19, 2.20.9-0ubuntu7.7, 2.20.10-0ubuntu27.1, 2.20.11-0ubuntu5 contained a TOCTTOU vulnerability when reading the users ~/.apport-ignore.xml file, which allows a local attacker to replace this file with a symlink to any other file on the system and so cause Apport to include the contents of this other file in the resulting crash report. The crash report could then be read by that user either by causing it to be uploaded and reported to Launchpad, or by leveraging some other vulnerability to read the resulting crash report, and so allow the user to read arbitrary files on the system.

CVSS3: 7
github
больше 3 лет назад

Apport before versions 2.14.1-0ubuntu3.29+esm1, 2.20.1-0ubuntu2.19, 2.20.9-0ubuntu7.7, 2.20.10-0ubuntu27.1, 2.20.11-0ubuntu5 contained a TOCTTOU vulnerability when reading the users ~/.apport-ignore.xml file, which allows a local attacker to replace this file with a symlink to any other file on the system and so cause Apport to include the contents of this other file in the resulting crash report. The crash report could then be read by that user either by causing it to be uploaded and reported to Launchpad, or by leveraging some other vulnerability to read the resulting crash report, and so allow the user to read arbitrary files on the system.

CVSS3: 7
fstec
больше 6 лет назад

Уязвимость файла ~/.apport-ignore.xml службы регистрации ошибок apport, позволяющая нарушителю читать произвольные файлы

4.4 Medium

CVSS2

7 High

CVSS3