Executive Summary

Informations
NameCVE-2019-7307First vendor Publication2019-08-29
VendorCveLast vendor Modification2019-10-09

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score4.4Attack RangeLocal
Cvss Impact Score6.4Attack ComplexityMedium
Cvss Expoit Score3.4AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Apport before versions 2.14.1-0ubuntu3.29+esm1, 2.20.1-0ubuntu2.19, 2.20.9-0ubuntu7.7, 2.20.10-0ubuntu27.1, 2.20.11-0ubuntu5 contained a TOCTTOU vulnerability when reading the users ~/.apport-ignore.xml file, which allows a local attacker to replace this file with a symlink to any other file on the system and so cause Apport to include the contents of this other file in the resulting crash report. The crash report could then be read by that user either by causing it to be uploaded and reported to Launchpad, or by leveraging some other vulnerability to read the resulting crash report, and so allow the user to read arbitrary files on the system.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7307

CWE : Common Weakness Enumeration

%idName
100 %CWE-362Race Condition

CPE : Common Platform Enumeration

TypeDescriptionCount
Application4
Os5

Sources (Detail)

SourceUrl
MISC https://bugs.launchpad.net/ubuntu/%2Bsource/apport/%2Bbug/1830858
https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-7307.html

Alert History

If you want to see full details history, please login or register.
0
1
2
DateInformations
2019-10-10 05:21:10
  • Multiple Updates
2019-09-05 00:18:57
  • Multiple Updates
2019-08-29 21:19:26
  • First insertion