CVE-2015-3315

Automatic Bug Reporting Tool (ABRT) allows local users to read, change the ownership of, or have other unspecified impact on arbitrary files via a symlink attack on (1) /var/tmp/abrt/*/maps, (2) /tmp/jvm-*/hs_error.log, (3) /proc/*/exe, (4) /etc/os-release in a chroot, or (5) an unspecified root directory related to librpm.
References
Link Resource
http://rhn.redhat.com/errata/RHSA-2015-1083.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-1210.html
http://www.openwall.com/lists/oss-security/2015/04/14/4 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2015/04/16/12 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/75117 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1211835 Issue Tracking Third Party Advisory VDB Entry
https://github.com/abrt/abrt/commit/17cb66b13997b0159b4253b3f5722db79f476d68 Patch Third Party Advisory
https://github.com/abrt/abrt/commit/4f2c1ddd3e3b81d2d5146b883115371f1cada9f9 Patch Third Party Advisory
https://github.com/abrt/abrt/commit/80408e9e24a1c10f85fd969e1853e0f192157f92 Patch Third Party Advisory
https://github.com/abrt/abrt/commit/d6e2f6f128cef4c21cb80941ae674c9842681aa7 Patch Third Party Advisory
https://www.exploit-db.com/exploits/44097/
http://rhn.redhat.com/errata/RHSA-2015-1083.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-1210.html
http://www.openwall.com/lists/oss-security/2015/04/14/4 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2015/04/16/12 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/75117 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1211835 Issue Tracking Third Party Advisory VDB Entry
https://github.com/abrt/abrt/commit/17cb66b13997b0159b4253b3f5722db79f476d68 Patch Third Party Advisory
https://github.com/abrt/abrt/commit/4f2c1ddd3e3b81d2d5146b883115371f1cada9f9 Patch Third Party Advisory
https://github.com/abrt/abrt/commit/80408e9e24a1c10f85fd969e1853e0f192157f92 Patch Third Party Advisory
https://github.com/abrt/abrt/commit/d6e2f6f128cef4c21cb80941ae674c9842681aa7 Patch Third Party Advisory
https://www.exploit-db.com/exploits/44097/
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:redhat:automatic_bug_reporting_tool:-:*:*:*:*:*:*:*
OR cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.1:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:29

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2015-1083.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2015-1083.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2015-1210.html - () http://rhn.redhat.com/errata/RHSA-2015-1210.html -
References () http://www.openwall.com/lists/oss-security/2015/04/14/4 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2015/04/14/4 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2015/04/16/12 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2015/04/16/12 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/75117 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/75117 - Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=1211835 - Issue Tracking, Third Party Advisory, VDB Entry () https://bugzilla.redhat.com/show_bug.cgi?id=1211835 - Issue Tracking, Third Party Advisory, VDB Entry
References () https://github.com/abrt/abrt/commit/17cb66b13997b0159b4253b3f5722db79f476d68 - Patch, Third Party Advisory () https://github.com/abrt/abrt/commit/17cb66b13997b0159b4253b3f5722db79f476d68 - Patch, Third Party Advisory
References () https://github.com/abrt/abrt/commit/4f2c1ddd3e3b81d2d5146b883115371f1cada9f9 - Patch, Third Party Advisory () https://github.com/abrt/abrt/commit/4f2c1ddd3e3b81d2d5146b883115371f1cada9f9 - Patch, Third Party Advisory
References () https://github.com/abrt/abrt/commit/80408e9e24a1c10f85fd969e1853e0f192157f92 - Patch, Third Party Advisory () https://github.com/abrt/abrt/commit/80408e9e24a1c10f85fd969e1853e0f192157f92 - Patch, Third Party Advisory
References () https://github.com/abrt/abrt/commit/d6e2f6f128cef4c21cb80941ae674c9842681aa7 - Patch, Third Party Advisory () https://github.com/abrt/abrt/commit/d6e2f6f128cef4c21cb80941ae674c9842681aa7 - Patch, Third Party Advisory
References () https://www.exploit-db.com/exploits/44097/ - () https://www.exploit-db.com/exploits/44097/ -

Information

Published : 2017-06-26 15:29

Updated : 2024-11-21 02:29


NVD link : CVE-2015-3315

Mitre link : CVE-2015-3315

CVE.ORG link : CVE-2015-3315


JSON object : View

Products Affected

redhat

  • enterprise_linux_workstation
  • enterprise_linux_hpc_node_eus
  • enterprise_linux_server
  • enterprise_linux_server_eus
  • enterprise_linux_desktop
  • automatic_bug_reporting_tool
  • enterprise_linux_hpc_node
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')