CVE-2015-1338

kernel_crashdump in Apport before 2.19 allows local users to cause a denial of service (disk consumption) or possibly gain privileges via a (1) symlink or (2) hard link attack on /var/crash/vmcore.log.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apport_project:apport:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*

History

21 Nov 2024, 02:25

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/133723/Ubuntu-Apport-kernel_crashdump-Symlink.html - Exploit () http://packetstormsecurity.com/files/133723/Ubuntu-Apport-kernel_crashdump-Symlink.html - Exploit
References () http://seclists.org/fulldisclosure/2015/Sep/101 - () http://seclists.org/fulldisclosure/2015/Sep/101 -
References () http://www.halfdog.net/Security/2015/ApportKernelCrashdumpFileAccessVulnerabilities/ - Exploit () http://www.halfdog.net/Security/2015/ApportKernelCrashdumpFileAccessVulnerabilities/ - Exploit
References () http://www.ubuntu.com/usn/USN-2744-1 - () http://www.ubuntu.com/usn/USN-2744-1 -
References () https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1492570 - () https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1492570 -
References () https://launchpad.net/apport/trunk/2.19 - Patch () https://launchpad.net/apport/trunk/2.19 - Patch
References () https://www.exploit-db.com/exploits/38353/ - Exploit () https://www.exploit-db.com/exploits/38353/ - Exploit

Information

Published : 2015-10-01 20:59

Updated : 2024-11-21 02:25


NVD link : CVE-2015-1338

Mitre link : CVE-2015-1338

CVE.ORG link : CVE-2015-1338


JSON object : View

Products Affected

canonical

  • ubuntu_linux

apport_project

  • apport
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')