kernel_crashdump in Apport before 2.19 allows local users to cause a denial of service (disk consumption) or possibly gain privileges via a (1) symlink or (2) hard link attack on /var/crash/vmcore.log.
References
Configurations
History
21 Nov 2024, 02:25
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/133723/Ubuntu-Apport-kernel_crashdump-Symlink.html - Exploit | |
References | () http://seclists.org/fulldisclosure/2015/Sep/101 - | |
References | () http://www.halfdog.net/Security/2015/ApportKernelCrashdumpFileAccessVulnerabilities/ - Exploit | |
References | () http://www.ubuntu.com/usn/USN-2744-1 - | |
References | () https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1492570 - | |
References | () https://launchpad.net/apport/trunk/2.19 - Patch | |
References | () https://www.exploit-db.com/exploits/38353/ - Exploit |
Information
Published : 2015-10-01 20:59
Updated : 2024-11-21 02:25
NVD link : CVE-2015-1338
Mitre link : CVE-2015-1338
CVE.ORG link : CVE-2015-1338
JSON object : View
Products Affected
canonical
- ubuntu_linux
apport_project
- apport
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')