Vulnerability Name: | CVE-2018-6552 (CCN-145507) | ||||||||||||||||||||||||||||
Assigned: | 2018-05-30 | ||||||||||||||||||||||||||||
Published: | 2018-05-30 | ||||||||||||||||||||||||||||
Updated: | 2019-10-03 | ||||||||||||||||||||||||||||
Summary: | Apport does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion, possibly gain root privileges, or escape from containers. The is_same_ns() function returns True when /proc/<global pid>/ does not exist in order to indicate that the crash should be handled in the global namespace rather than inside of a container. However, the portion of the data/apport code that decides whether or not to forward a crash to a container does not always replace sys.argv[1] with the value stored in the host_pid variable when /proc/<global pid>/ does not exist which results in the container pid being used in the global namespace. This flaw affects versions 2.20.8-0ubuntu4 through 2.20.9-0ubuntu7, 2.20.7-0ubuntu3.7, 2.20.7-0ubuntu3.8, 2.20.1-0ubuntu2.15 through 2.20.1-0ubuntu2.17, and 2.14.1-0ubuntu3.28. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.3 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||||||||||||||||||||||
Vulnerability Type: | CWE-noinfo | ||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-6552 Source: XF Type: UNKNOWN apport-cve20186552-priv-esc(145507) Source: CCN Type: Ubuntu Web site Apport Source: CCN Type: Cisco Alert ID: 58007 Ubuntu Apport Package Core Dump Handling Privilege Escalation Vulnerability Source: CCN Type: Ubuntu Security Notice USN-3664-1 Apport vulnerability Source: UBUNTU Type: Vendor Advisory USN-3664-2 Source: UBUNTU Type: Vendor Advisory USN-3664-1 Source: CCN Type: WhiteSource Vulnerability Database CVE-2018-6552 | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: ![]() | ||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
BACK |