The parse_report() function in whoopsie.c in Whoopsie through 0.2.69 mishandles memory allocation failures, which allows an attacker to cause a denial of service via a malformed crash file.
References
Link | Resource |
---|---|
https://github.com/sungjungk/whoopsie_killer2/blob/master/README.md | Exploit Third Party Advisory |
https://launchpad.net/ubuntu/+source/whoopsie | Third Party Advisory |
https://www.youtube.com/watch?v=oZXGwC7PWYE | Exploit Third Party Advisory |
https://github.com/sungjungk/whoopsie_killer2/blob/master/whoopsie_killer2.py | Exploit Third Party Advisory |
https://usn.ubuntu.com/4450-1/ |
Configurations
Information
Published : 2020-07-06 07:15
Updated : 2020-08-12 10:15
NVD link : CVE-2020-15570
Mitre link : CVE-2020-15570
JSON object : View
CWE
CWE-770
Allocation of Resources Without Limits or Throttling
Products Affected
whoopsie_project
- whoopsie