Vulnerability Name: | CVE-2020-8831 (CCN-180460) | ||||||||||||
Assigned: | 2020-02-07 | ||||||||||||
Published: | 2020-02-07 | ||||||||||||
Updated: | 2022-10-07 | ||||||||||||
Summary: | Apport creates a world writable lock file with root ownership in the world writable /var/lock/apport directory. If the apport/ directory does not exist (this is not uncommon as /var/lock is a tmpfs), it will create the directory, otherwise it will simply continue execution using the existing directory. This allows for a symlink attack if an attacker were to create a symlink at /var/lock/apport, changing apport's lock file location. This file could then be used to escalate privileges, for example. Fixed in versions 2.20.1-0ubuntu2.23, 2.20.9-0ubuntu7.14, 2.20.11-0ubuntu8.8 and 2.20.11-0ubuntu22. | ||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N) 4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
6.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N)
| ||||||||||||
Vulnerability Type: | CWE-59 | ||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-8831 Source: CCN Type: Launchpad Bug #1862348 Apport lock file root privilege escalation Source: XF Type: UNKNOWN ubuntu-cve20208831-priv-esc(180460) Source: CONFIRM Type: Exploit, Third Party Advisory https://launchpad.net/bugs/1862348 Source: CCN Type: Ubuntu Web site Apport package Source: CONFIRM Type: Third Party Advisory https://usn.ubuntu.com/4315-1/ Source: UBUNTU Type: Third Party Advisory USN-4315-2 Source: CCN Type: WhiteSource Vulnerability Database CVE-2020-8831 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: ![]() | ||||||||||||
BACK |