Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-15702

Опубликовано: 06 авг. 2020
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.4
CVSS3: 7

Описание

TOCTOU Race Condition vulnerability in apport allows a local attacker to escalate privileges and execute arbitrary code. An attacker may exit the crashed process and exploit PID recycling to spawn a root process with the same PID as the crashed process, which can then be used to escalate privileges. Fixed in 2.20.1-0ubuntu2.24, 2.20.9 versions prior to 2.20.9-0ubuntu7.16 and 2.20.11 versions prior to 2.20.11-0ubuntu27.6. Was ZDI-CAN-11234.

РелизСтатусПримечание
bionic

released

2.20.9-0ubuntu7.16
devel

released

2.20.11-0ubuntu44
eoan

ignored

end of life
esm-infra-legacy/trusty

released

2.14.1-0ubuntu3.29+esm5
esm-infra/bionic

released

2.20.9-0ubuntu7.16
esm-infra/focal

released

2.20.11-0ubuntu27.6
esm-infra/xenial

released

2.20.1-0ubuntu2.24
focal

released

2.20.11-0ubuntu27.6
precise/esm

DNE

trusty

ignored

end of standard support

Показывать по

EPSS

Процентиль: 13%
0.00044
Низкий

4.4 Medium

CVSS2

7 High

CVSS3

Связанные уязвимости

CVSS3: 7
nvd
больше 5 лет назад

TOCTOU Race Condition vulnerability in apport allows a local attacker to escalate privileges and execute arbitrary code. An attacker may exit the crashed process and exploit PID recycling to spawn a root process with the same PID as the crashed process, which can then be used to escalate privileges. Fixed in 2.20.1-0ubuntu2.24, 2.20.9 versions prior to 2.20.9-0ubuntu7.16 and 2.20.11 versions prior to 2.20.11-0ubuntu27.6. Was ZDI-CAN-11234.

CVSS3: 7
github
больше 3 лет назад

TOCTOU Race Condition vulnerability in apport allows a local attacker to escalate privileges and execute arbitrary code. An attacker may exit the crashed process and exploit PID recycling to spawn a root process with the same PID as the crashed process, which can then be used to escalate privileges. Fixed in 2.20.1-0ubuntu2.24, 2.20.9 versions prior to 2.20.9-0ubuntu7.16 and 2.20.11 versions prior to 2.20.11-0ubuntu27.6. Was ZDI-CAN-11234.

CVSS3: 7
fstec
больше 5 лет назад

Уязвимость службы регистрации ошибок Apport, существующая из-за недостаточной проверки состояния совместно используемого ресурса, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код

EPSS

Процентиль: 13%
0.00044
Низкий

4.4 Medium

CVSS2

7 High

CVSS3