The kernel-invoked coredump processor in Automatic Bug Reporting Tool (ABRT) does not properly check the ownership of files before writing core dumps to them, which allows local users to obtain sensitive information by leveraging write permissions to the working directory of a crashed application.
References
Link | Resource |
---|---|
http://rhn.redhat.com/errata/RHSA-2015-1083.html | Vendor Advisory |
http://rhn.redhat.com/errata/RHSA-2015-1210.html | |
http://www.openwall.com/lists/oss-security/2015/04/17/5 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/75116 | Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=1212818 | Issue Tracking Vendor Advisory |
Configurations
History
No history.
Information
Published : 2017-06-26 15:29
Updated : 2024-02-04 19:29
NVD link : CVE-2015-3142
Mitre link : CVE-2015-3142
CVE.ORG link : CVE-2015-3142
JSON object : View
Products Affected
redhat
- automatic_bug_reporting_tool
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor