Show filters
25 Total Results
Displaying 21-25 of 25
Sort by:
Attacker Value
Unknown
CVE-2016-9950
Disclosure Date: December 17, 2016 (last updated November 25, 2024)
An issue was discovered in Apport before 2.20.4. There is a path traversal issue in the Apport crash file "Package" and "SourcePackage" fields. These fields are used to build a path to the package specific hook files in the /usr/share/apport/package-hooks/ directory. An attacker can exploit this path traversal to execute arbitrary Python files from the local system.
0
Attacker Value
Unknown
CVE-2016-9949
Disclosure Date: December 17, 2016 (last updated November 25, 2024)
An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads the CrashDB field and it then evaluates the field as Python code if it begins with a "{". This allows remote attackers to execute arbitrary Python code.
0
Attacker Value
Unknown
CVE-2015-1338
Disclosure Date: October 01, 2015 (last updated October 05, 2023)
kernel_crashdump in Apport before 2.19 allows local users to cause a denial of service (disk consumption) or possibly gain privileges via a (1) symlink or (2) hard link attack on /var/crash/vmcore.log.
0
Attacker Value
Unknown
CVE-2015-1318
Disclosure Date: April 17, 2015 (last updated October 05, 2023)
The crash reporting feature in Apport 2.13 through 2.17.x before 2.17.1 allows local users to gain privileges via a crafted usr/share/apport/apport file in a namespace (container).
0
Attacker Value
Unknown
CVE-2009-1295
Disclosure Date: April 30, 2009 (last updated October 04, 2023)
Apport before 0.108.4 on Ubuntu 8.04 LTS, before 0.119.2 on Ubuntu 8.10, and before 1.0-0ubuntu5.2 on Ubuntu 9.04 does not properly remove files from the application's crash-report directory, which allows local users to delete arbitrary files via unspecified vectors.
0