Vulnerability CVE-2017-14177


Published: 2018-02-02

Description:
Apport through 2.20.7 does not properly handle core dumps from setuid binaries allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1324.

Type:

CWE-400

(Uncontrolled Resource Consumption ('Resource Exhaustion'))

CVSS2 => (AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.2/10
10/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Canonical -> Ubuntu linux 
Apport project -> Apport 

 References:
https://bazaar.launchpad.net/~apport-hackers/apport/trunk/revision/3171
https://launchpad.net/bugs/1726372
https://people.canonical.com/~ubuntu-security/cve/?cve=CVE-2017-14177
https://usn.ubuntu.com/usn/usn-3480-1

Copyright 2024, cxsecurity.com

 

Back to Top