Apport before 2.17.2-0ubuntu1.1 as packaged in Ubuntu 15.04, before 2.14.70ubuntu8.5 as packaged in Ubuntu 14.10, before 2.14.1-0ubuntu3.11 as packaged in Ubuntu 14.04 LTS, and before 2.0.1-0ubuntu17.9 as packaged in Ubuntu 12.04 LTS allow local users to write to arbitrary files and gain root privileges by leveraging incorrect handling of permissions when generating core dumps for setuid binaries.
References
Link Resource
http://www.securityfocus.com/bid/74767 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2609-1 Patch Vendor Advisory
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1452239 Issue Tracking Patch Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: canonical

Published: 2017-08-25T18:00:00

Updated: 2017-08-28T12:57:01

Reserved: 2015-01-22T00:00:00


Link: CVE-2015-1324

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2017-08-25T18:29:00.513

Modified: 2017-08-30T15:54:07.747


Link: CVE-2015-1324

JSON object: View

cve-icon Redhat Information

No data.

CWE