CVE-2017-10708

Publication date 18 July 2017

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

7.8 · High

Score breakdown

An issue was discovered in Apport through 2.20.x. In apport/report.py, Apport sets the ExecutablePath field and it then uses the path to run package specific hooks without protecting against path traversal. This allows remote attackers to execute arbitrary code via a crafted .crash file.

Read the notes from the security team

Status

Package Ubuntu Release Status
apport 17.04 zesty
Fixed 2.20.4-0ubuntu4.5
16.10 yakkety
Fixed 2.20.3-0ubuntu8.7
16.04 LTS xenial
Fixed 2.20.1-0ubuntu2.10
14.04 LTS trusty
Fixed 2.14.1-0ubuntu3.25

Notes


tyhicks

Apport registers itself as the default handler for .crash files so an attacker could trick a user into opening a malicious .crash file and execute arbitrary code as the user. A potential method of hardening apport against these types of attacks is to unregister it as the handler for .crash files.

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
apport

Severity score breakdown

Parameter Value
Base score 7.8 · High
Attack vector Local
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

References

Related Ubuntu Security Notices (USN)

Other references