Apport before 2.17.2-0ubuntu1.1 as packaged in Ubuntu 15.04, before 2.14.70ubuntu8.5 as packaged in Ubuntu 14.10, before 2.14.1-0ubuntu3.11 as packaged in Ubuntu 14.04 LTS, and before 2.0.1-0ubuntu17.9 as packaged in Ubuntu 12.04 LTS allow local users to write to arbitrary files and gain root privileges by leveraging incorrect handling of permissions when generating core dumps for setuid binaries.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/74767 | Third Party Advisory VDB Entry |
http://www.ubuntu.com/usn/USN-2609-1 | Patch Vendor Advisory |
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1452239 | Issue Tracking Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: canonical
Published: 2017-08-25T18:00:00
Updated: 2017-08-28T12:57:01
Reserved: 2015-01-22T00:00:00
Link: CVE-2015-1324
JSON object: View
NVD Information
Status : Analyzed
Published: 2017-08-25T18:29:00.513
Modified: 2017-08-30T15:54:07.747
Link: CVE-2015-1324
JSON object: View
Redhat Information
No data.
CWE