Unknown
CVE-2021-3709
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2021-3709
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Function check_attachment_for_errors() in file data/general-hooks/ubuntu.py could be tricked into exposing private data via a constructed crash file. This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8; 2.20.1 versions prior to 2.20.1-0ubuntu2.30+esm2; 2.20.9 versions prior to 2.20.9-0ubuntu7.26; 2.20.11 versions prior to 2.20.11-0ubuntu27.20; 2.20.11 versions prior to 2.20.11-0ubuntu65.3;
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- apport 2.14.1-0ubuntu1,
- apport 2.14.1-0ubuntu2,
- apport 2.14.1-0ubuntu3,
- apport 2.14.1-0ubuntu3.1,
- apport 2.14.1-0ubuntu3.10,
- apport 2.14.1-0ubuntu3.11,
- apport 2.14.1-0ubuntu3.12,
- apport 2.14.1-0ubuntu3.13,
- apport 2.14.1-0ubuntu3.14,
- apport 2.14.1-0ubuntu3.15,
- apport 2.14.1-0ubuntu3.16,
- apport 2.14.1-0ubuntu3.17,
- apport 2.14.1-0ubuntu3.18,
- apport 2.14.1-0ubuntu3.19,
- apport 2.14.1-0ubuntu3.2,
- apport 2.14.1-0ubuntu3.20,
- apport 2.14.1-0ubuntu3.21,
- apport 2.14.1-0ubuntu3.23,
- apport 2.14.1-0ubuntu3.24,
- apport 2.14.1-0ubuntu3.25,
- apport 2.14.1-0ubuntu3.27,
- apport 2.14.1-0ubuntu3.28,
- apport 2.14.1-0ubuntu3.29,
- apport 2.14.1-0ubuntu3.29+esm7,
- apport 2.14.1-0ubuntu3.3,
- apport 2.14.1-0ubuntu3.4,
- apport 2.14.1-0ubuntu3.5,
- apport 2.14.1-0ubuntu3.6,
- apport 2.14.1-0ubuntu3.7,
- apport 2.14.1-0ubuntu3.8,
- apport 2.14.1-0ubuntu3.9,
- apport 2.20.1-0ubuntu1,
- apport 2.20.1-0ubuntu2,
- apport 2.20.1-0ubuntu2.1,
- apport 2.20.1-0ubuntu2.10,
- apport 2.20.1-0ubuntu2.12,
- apport 2.20.1-0ubuntu2.13,
- apport 2.20.1-0ubuntu2.14,
- apport 2.20.1-0ubuntu2.15,
- apport 2.20.1-0ubuntu2.16,
- apport 2.20.1-0ubuntu2.17,
- apport 2.20.1-0ubuntu2.18,
- apport 2.20.1-0ubuntu2.19,
- apport 2.20.1-0ubuntu2.2,
- apport 2.20.1-0ubuntu2.20,
- apport 2.20.1-0ubuntu2.21,
- apport 2.20.1-0ubuntu2.22,
- apport 2.20.1-0ubuntu2.23,
- apport 2.20.1-0ubuntu2.25,
- apport 2.20.1-0ubuntu2.26,
- apport 2.20.1-0ubuntu2.27,
- apport 2.20.1-0ubuntu2.28,
- apport 2.20.1-0ubuntu2.30,
- apport 2.20.1-0ubuntu2.30+esm1,
- apport 2.20.1-0ubuntu2.4,
- apport 2.20.1-0ubuntu2.5,
- apport 2.20.1-0ubuntu2.6,
- apport 2.20.1-0ubuntu2.7,
- apport 2.20.1-0ubuntu2.8,
- apport 2.20.1-0ubuntu2.9,
- apport 2.20.11-0ubuntu10,
- apport 2.20.11-0ubuntu11,
- apport 2.20.11-0ubuntu12,
- apport 2.20.11-0ubuntu13,
- apport 2.20.11-0ubuntu14,
- apport 2.20.11-0ubuntu15,
- apport 2.20.11-0ubuntu16,
- apport 2.20.11-0ubuntu17,
- apport 2.20.11-0ubuntu18,
- apport 2.20.11-0ubuntu19,
- apport 2.20.11-0ubuntu20,
- apport 2.20.11-0ubuntu21,
- apport 2.20.11-0ubuntu22,
- apport 2.20.11-0ubuntu23,
- apport 2.20.11-0ubuntu24,
- apport 2.20.11-0ubuntu25,
- apport 2.20.11-0ubuntu26,
- apport 2.20.11-0ubuntu27,
- apport 2.20.11-0ubuntu27.10,
- apport 2.20.11-0ubuntu27.11,
- apport 2.20.11-0ubuntu27.12,
- apport 2.20.11-0ubuntu27.13,
- apport 2.20.11-0ubuntu27.14,
- apport 2.20.11-0ubuntu27.16,
- apport 2.20.11-0ubuntu27.17,
- apport 2.20.11-0ubuntu27.18,
- apport 2.20.11-0ubuntu27.2,
- apport 2.20.11-0ubuntu27.3,
- apport 2.20.11-0ubuntu27.4,
- apport 2.20.11-0ubuntu27.5,
- apport 2.20.11-0ubuntu27.6,
- apport 2.20.11-0ubuntu27.7,
- apport 2.20.11-0ubuntu27.8,
- apport 2.20.11-0ubuntu27.9,
- apport 2.20.11-0ubuntu28,
- apport 2.20.11-0ubuntu29,
- apport 2.20.11-0ubuntu30,
- apport 2.20.11-0ubuntu31,
- apport 2.20.11-0ubuntu32,
- apport 2.20.11-0ubuntu33,
- apport 2.20.11-0ubuntu34,
- apport 2.20.11-0ubuntu35,
- apport 2.20.11-0ubuntu36,
- apport 2.20.11-0ubuntu37,
- apport 2.20.11-0ubuntu38,
- apport 2.20.11-0ubuntu39,
- apport 2.20.11-0ubuntu40,
- apport 2.20.11-0ubuntu41,
- apport 2.20.11-0ubuntu42,
- apport 2.20.11-0ubuntu43,
- apport 2.20.11-0ubuntu44,
- apport 2.20.11-0ubuntu45,
- apport 2.20.11-0ubuntu46,
- apport 2.20.11-0ubuntu47,
- apport 2.20.11-0ubuntu48,
- apport 2.20.11-0ubuntu49,
- apport 2.20.11-0ubuntu50,
- apport 2.20.11-0ubuntu50.1,
- apport 2.20.11-0ubuntu50.2,
- apport 2.20.11-0ubuntu50.3,
- apport 2.20.11-0ubuntu50.5,
- apport 2.20.11-0ubuntu50.7,
- apport 2.20.11-0ubuntu51,
- apport 2.20.11-0ubuntu52,
- apport 2.20.11-0ubuntu53,
- apport 2.20.11-0ubuntu54,
- apport 2.20.11-0ubuntu55,
- apport 2.20.11-0ubuntu56,
- apport 2.20.11-0ubuntu57,
- apport 2.20.11-0ubuntu58,
- apport 2.20.11-0ubuntu59,
- apport 2.20.11-0ubuntu60,
- apport 2.20.11-0ubuntu61,
- apport 2.20.11-0ubuntu62,
- apport 2.20.11-0ubuntu63,
- apport 2.20.11-0ubuntu64,
- apport 2.20.11-0ubuntu65,
- apport 2.20.11-0ubuntu65.1,
- apport 2.20.11-0ubuntu8,
- apport 2.20.11-0ubuntu9,
- apport 2.20.9-0ubuntu1,
- apport 2.20.9-0ubuntu2,
- apport 2.20.9-0ubuntu3,
- apport 2.20.9-0ubuntu4,
- apport 2.20.9-0ubuntu5,
- apport 2.20.9-0ubuntu6,
- apport 2.20.9-0ubuntu7,
- apport 2.20.9-0ubuntu7.1,
- apport 2.20.9-0ubuntu7.10,
- apport 2.20.9-0ubuntu7.11,
- apport 2.20.9-0ubuntu7.12,
- apport 2.20.9-0ubuntu7.13,
- apport 2.20.9-0ubuntu7.14,
- apport 2.20.9-0ubuntu7.15,
- apport 2.20.9-0ubuntu7.16,
- apport 2.20.9-0ubuntu7.17,
- apport 2.20.9-0ubuntu7.18,
- apport 2.20.9-0ubuntu7.19,
- apport 2.20.9-0ubuntu7.2,
- apport 2.20.9-0ubuntu7.20,
- apport 2.20.9-0ubuntu7.21,
- apport 2.20.9-0ubuntu7.23,
- apport 2.20.9-0ubuntu7.24,
- apport 2.20.9-0ubuntu7.3,
- apport 2.20.9-0ubuntu7.4,
- apport 2.20.9-0ubuntu7.5,
- apport 2.20.9-0ubuntu7.6,
- apport 2.20.9-0ubuntu7.7,
- apport 2.20.9-0ubuntu7.8,
- apport 2.20.9-0ubuntu7.9
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: