CVE-2015-1862

The crash reporting feature in Abrt allows local users to gain privileges by leveraging an execve by root after a chroot into a user-specified directory in a namedspaced environment.
References
Link Resource
https://www.exploit-db.com/exploits/36747/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/36746/ Exploit Third Party Advisory VDB Entry
https://github.com/abrt/abrt/pull/810 Issue Tracking Patch Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1211223 Issue Tracking Third Party Advisory
http://www.securityfocus.com/bid/74263 Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2015/04/14/4 Mailing List
http://seclists.org/fulldisclosure/2015/Apr/34 Mailing List Third Party Advisory
http://packetstormsecurity.com/files/131429/Abrt-Apport-Race-Condition-Symlink.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/131423/Linux-Apport-Abrt-Local-Root-Exploit.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/131422/Fedora-abrt-Race-Condition.html Exploit Third Party Advisory VDB Entry
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:abrt_project:abrt:*:*:*:*:*:*:*:*

Information

Published : 2018-02-09 14:29

Updated : 2018-03-08 08:03


NVD link : CVE-2015-1862

Mitre link : CVE-2015-1862


JSON object : View

CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Advertisement

dedicated server usa

Products Affected

abrt_project

  • abrt