click/install.py in click does not require files in package filesystem tarballs to start with ./ (dot slash), which allows remote attackers to install an alternate security policy and gain privileges via a crafted package, as demonstrated by the test.mmrow app for Ubuntu phone.
References
Configurations
History
21 Nov 2024, 02:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://bazaar.launchpad.net/~click-hackers/click/devel/revision/587 - | |
References | () http://ubuntu.com/usn/usn-2771-1 - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2016/01/12/8 - Mailing List, Patch, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/96386 - Third Party Advisory, VDB Entry | |
References | () https://bugs.launchpad.net/ubuntu/+source/click/+bug/1506467 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://code.launchpad.net/~cjwatson/click/audit-missing-dot-slash/+merge/274554 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://insights.ubuntu.com/2015/10/15/update-on-ubuntu-phone-security-issue/ - | |
References | () https://plus.google.com/+SzymonWaliczek/posts/3jbG2uiAniF - |
Information
Published : 2017-02-13 18:59
Updated : 2024-11-21 02:39
NVD link : CVE-2015-8768
Mitre link : CVE-2015-8768
CVE.ORG link : CVE-2015-8768
JSON object : View
Products Affected
click_project
- click
canonical
- ubuntu_linux
CWE
CWE-264
Permissions, Privileges, and Access Controls