Kevin Backhouse discovered that apport would read a user-supplied configuration file with elevated privileges. By replacing the file with a symbolic link, a user could get apport to read any file on the system as root, with unknown consequences.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/172858/Ubuntu-Apport-Whoopsie-DoS-Integer-Overflow.html | |
https://usn.ubuntu.com/usn/usn-4171-1 | Third Party Advisory |
https://usn.ubuntu.com/usn/usn-4171-2 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
12 Jun 2023, 07:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2020-02-08 05:15
Updated : 2024-02-04 20:39
NVD link : CVE-2019-11481
Mitre link : CVE-2019-11481
CVE.ORG link : CVE-2019-11481
JSON object : View
Products Affected
apport_project
- apport
canonical
- ubuntu_linux
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')