Vulnerability Name: | CVE-2017-10708 (CCN-129518) | ||||||||||||||||
Assigned: | 2017-06-26 | ||||||||||||||||
Published: | 2017-06-26 | ||||||||||||||||
Updated: | 2017-08-07 | ||||||||||||||||
Summary: | An issue was discovered in Apport through 2.20.x. In apport/report.py, Apport sets the ExecutablePath field and it then uses the path to run package specific hooks without protecting against path traversal. This allows remote attackers to execute arbitrary code via a crafted .crash file. | ||||||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
6.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||
Vulnerability Type: | CWE-22 | ||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-10708 Source: CCN Type: Launchpad Bug #1700573 Code execution through path traversal in .crash files processing Source: XF Type: UNKNOWN apport-cve201710708-code-exec(129518) Source: CONFIRM Type: Third Party Advisory https://launchpad.net/bugs/1700573 Source: CCN Type: Ubuntu Web site Apport Source: CONFIRM Type: Third Party Advisory https://launchpad.net/ubuntu/+source/apport/+changelog | ||||||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |