The default event handling scripts in Automatic Bug Reporting Tool (ABRT) allow local users to gain privileges as demonstrated by a symlink attack on a var_log_messages file.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2015/04/17/5 | Mailing List Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1212861 | Issue Tracking Third Party Advisory |
https://github.com/abrt/abrt/commit/3287aa12eb205cff95cdd00d6d6c5c9a4f8f0eca | Patch Third Party Advisory |
https://github.com/abrt/abrt/commit/7417505e1d93cc95ec648b74e3c801bc67aacb9f | Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2020-01-14 18:15
Updated : 2024-02-28 17:28
NVD link : CVE-2015-1869
Mitre link : CVE-2015-1869
CVE.ORG link : CVE-2015-1869
JSON object : View
Products Affected
redhat
- automatic_bug_reporting_tool
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')