Vulnerability Name: | CVE-2015-3315 (CCN-102788) | ||||||||||||
Assigned: | 2015-04-14 | ||||||||||||
Published: | 2015-04-14 | ||||||||||||
Updated: | 2018-02-19 | ||||||||||||
Summary: | Automatic Bug Reporting Tool (ABRT) allows local users to read, change the ownership of, or have other unspecified impact on arbitrary files via a symlink attack on (1) /var/tmp/abrt/*/maps, (2) /tmp/jvm-*/hs_error.log, (3) /proc/*/exe, (4) /etc/os-release in a chroot, or (5) an unspecified root directory related to librpm. | ||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
| ||||||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C) 5.9 Medium (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
2.7 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:P/A:P/E:F/RL:OF/RC:C)
5.9 Medium (REDHAT Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
| ||||||||||||
Vulnerability Type: | CWE-59 CWE-362 CWE-59 CWE-59 | ||||||||||||
Vulnerability Consequences: | File Manipulation | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2015-3315 Source: REDHAT Type: Third Party Advisory RHSA-2015:1083 Source: REDHAT Type: UNKNOWN RHSA-2015:1210 Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20150414 Problems in automatic crash analysis frameworks Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20150416 Re: Problems in automatic crash analysis frameworks Source: BID Type: Third Party Advisory, VDB Entry 75117 Source: CCN Type: BID-75117 abrt CVE-2015-3315 Multiple Local Privilege Escalation Vulnerabilities Source: CONFIRM Type: Issue Tracking, Third Party Advisory, VDB Entry https://bugzilla.redhat.com/show_bug.cgi?id=1211835 Source: XF Type: UNKNOWN abrt-cve20153315-symlink(102788) Source: CCN Type: abrt Web page abrt Source: CONFIRM Type: Patch, Third Party Advisory https://github.com/abrt/abrt/commit/17cb66b13997b0159b4253b3f5722db79f476d68 Source: CONFIRM Type: Patch, Third Party Advisory https://github.com/abrt/abrt/commit/4f2c1ddd3e3b81d2d5146b883115371f1cada9f9 Source: CONFIRM Type: Patch, Third Party Advisory https://github.com/abrt/abrt/commit/80408e9e24a1c10f85fd969e1853e0f192157f92 Source: CCN Type: abrt GIT Repository ccpp: add support for containers Source: CONFIRM Type: Patch, Third Party Advisory https://github.com/abrt/abrt/commit/d6e2f6f128cef4c21cb80941ae674c9842681aa7 Source: CCN Type: Packet Storm Security [04-15-2015] Fedora abrt Race Condition Source: CCN Type: Packet Storm Security [02-15-2018] ABRT raceabrt Privilege Escalation Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [02-16-2018] Source: EXPLOIT-DB Type: UNKNOWN 44097 Source: CCN Type: WhiteSource Vulnerability Database CVE-2015-3315 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration RedHat 6: Configuration RedHat 7: Configuration RedHat 8: Configuration RedHat 9: Configuration RedHat 10: Configuration CCN 1: ![]() | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |