CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
28.9%
TOCTOU Race Condition vulnerability in apport allows a local attacker to escalate privileges and execute arbitrary code. An attacker may exit the crashed process and exploit PID recycling to spawn a root process with the same PID as the crashed process, which can then be used to escalate privileges. Fixed in 2.20.1-0ubuntu2.24, 2.20.9 versions prior to 2.20.9-0ubuntu7.16 and 2.20.11 versions prior to 2.20.11-0ubuntu27.6. Was ZDI-CAN-11234.
Vendor | Product | Version | CPE |
---|---|---|---|
canonical | apport | 2.20.11-0ubuntu8 | cpe:2.3:a:canonical:apport:2.20.11-0ubuntu8:*:*:*:*:*:*:* |
canonical | apport | 2.20.11-0ubuntu9 | cpe:2.3:a:canonical:apport:2.20.11-0ubuntu9:*:*:*:*:*:*:* |
canonical | apport | 2.20.11-0ubuntu10 | cpe:2.3:a:canonical:apport:2.20.11-0ubuntu10:*:*:*:*:*:*:* |
canonical | apport | 2.20.11-0ubuntu11 | cpe:2.3:a:canonical:apport:2.20.11-0ubuntu11:*:*:*:*:*:*:* |
canonical | apport | 2.20.11-0ubuntu12 | cpe:2.3:a:canonical:apport:2.20.11-0ubuntu12:*:*:*:*:*:*:* |
canonical | apport | 2.20.11-0ubuntu13 | cpe:2.3:a:canonical:apport:2.20.11-0ubuntu13:*:*:*:*:*:*:* |
canonical | apport | 2.20.11-0ubuntu14 | cpe:2.3:a:canonical:apport:2.20.11-0ubuntu14:*:*:*:*:*:*:* |
canonical | apport | 2.20.11-0ubuntu15 | cpe:2.3:a:canonical:apport:2.20.11-0ubuntu15:*:*:*:*:*:*:* |
canonical | apport | 2.20.11-0ubuntu16 | cpe:2.3:a:canonical:apport:2.20.11-0ubuntu16:*:*:*:*:*:*:* |
canonical | apport | 2.20.11-0ubuntu17 | cpe:2.3:a:canonical:apport:2.20.11-0ubuntu17:*:*:*:*:*:*:* |
[
{
"product": "apport",
"vendor": "Canonical",
"versions": [
{
"lessThan": "2.20.1-0ubuntu2.24",
"status": "affected",
"version": "2.20.1",
"versionType": "custom"
},
{
"lessThan": "2.20.9-0ubuntu7.16",
"status": "affected",
"version": "2.20.9",
"versionType": "custom"
},
{
"lessThan": "2.20.11-0ubuntu27.6",
"status": "affected",
"version": "2.20.11",
"versionType": "custom"
}
]
}
]
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
28.9%