Vulnerability Name: | CVE-2016-9949 (CCN-119932) | ||||||||||||||||||||
Assigned: | 2016-12-14 | ||||||||||||||||||||
Published: | 2016-12-14 | ||||||||||||||||||||
Updated: | 2017-01-07 | ||||||||||||||||||||
Summary: | An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads the CrashDB field and it then evaluates the field as Python code if it begins with a "{". This allows remote attackers to execute arbitrary Python code. | ||||||||||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.0 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
6.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C)
| ||||||||||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
| ||||||||||||||||||||
Vulnerability Type: | CWE-94 | ||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2016-9949 Source: BID Type: Third Party Advisory, VDB Entry 95011 Source: CCN Type: BID-95011 Apport Multiple Security Vulnerabilities Source: UBUNTU Type: UNKNOWN USN-3157-1 Source: MISC Type: Issue Tracking, Patch https://bugs.launchpad.net/apport/+bug/1648806 Source: MISC Type: Exploit, Technical Description, Third Party Advisory https://donncha.is/2016/12/compromising-ubuntu-desktop/ Source: XF Type: UNKNOWN apport-cve20169949-code-exec(119932) Source: MISC Type: Issue Tracking, Third Party Advisory https://github.com/DonnchaC/ubuntu-apport-exploitation Source: CCN Type: Ubuntu apport package apport package : Ubuntu Source: CCN Type: Packet Storm Security [12-19-2016] Apport 2.x Local Code Execution Source: CCN Type: Ubuntu Web site Apport - Ubuntu Wiki Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [12-14-2016] Source: EXPLOIT-DB Type: UNKNOWN 40937 Source: CCN Type: WhiteSource Vulnerability Database CVE-2016-9949 | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Denotes that component is vulnerable | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |