This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Apport Project First view 2015-04-17
Product Apport Last view 2024-06-04
Version 2.17 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:apport_project:apport

Activity : Overall

Related : CVE

  Date Alert Description
5.5 2024-06-04 CVE-2022-28658

Apport argument parsing mishandles filename splitting on older kernels resulting in argument spoofing

7.8 2024-06-04 CVE-2022-28657

Apport does not disable python crash handler before entering chroot

5.5 2024-06-04 CVE-2022-28656

is_closing_session() allows users to consume RAM in the Apport process

7.1 2024-06-04 CVE-2022-28655

is_closing_session() allows users to create arbitrary tcp dbus connections

5.5 2024-06-04 CVE-2022-28654

is_closing_session() allows users to fill up apport.log

5.5 2024-06-04 CVE-2022-28652

~/.config/apport/settings parsing is vulnerable to "billion laughs" attack

7.8 2018-02-02 CVE-2017-14180

Apport 2.13 through 2.20.7 does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges, a different vulnerability than CVE-2017-14179.

7.8 2018-02-02 CVE-2017-14177

Apport through 2.20.7 does not properly handle core dumps from setuid binaries allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1324.

7.8 2017-07-18 CVE-2017-10708

An issue was discovered in Apport through 2.20.x. In apport/report.py, Apport sets the ExecutablePath field and it then uses the path to run package specific hooks without protecting against path traversal. This allows remote attackers to execute arbitrary code via a crafted .crash file.

6.5 2016-12-16 CVE-2016-9951

An issue was discovered in Apport before 2.20.4. A malicious Apport crash file can contain a restart command in `RespawnCommand` or `ProcCmdline` fields. This command will be executed if a user clicks the Relaunch button on the Apport prompt from the malicious crash file. The fix is to only show the Relaunch button on Apport crash files generated by local systems. The Relaunch button will be hidden when crash files are opened directly in Apport-GTK.

7.8 2016-12-16 CVE-2016-9950

An issue was discovered in Apport before 2.20.4. There is a path traversal issue in the Apport crash file "Package" and "SourcePackage" fields. These fields are used to build a path to the package specific hook files in the /usr/share/apport/package-hooks/ directory. An attacker can exploit this path traversal to execute arbitrary Python files from the local system.

7.8 2016-12-16 CVE-2016-9949

An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads the CrashDB field and it then evaluates the field as Python code if it begins with a "{". This allows remote attackers to execute arbitrary Python code.

7.2 2015-10-01 CVE-2015-1338

kernel_crashdump in Apport before 2.19 allows local users to cause a denial of service (disk consumption) or possibly gain privileges via a (1) symlink or (2) hard link attack on /var/crash/vmcore.log.

7.2 2015-04-17 CVE-2015-1318

The crash reporting feature in Apport 2.13 through 2.17.x before 2.17.1 allows local users to gain privileges via a crafted usr/share/apport/apport file in a namespace (container).

CWE : Common Weakness Enumeration

%idName
25% (3) CWE-770 Allocation of Resources Without Limits or Throttling
16% (2) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
16% (2) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
8% (1) CWE-776 Unrestricted Recursive Entity References in DTDs ('XML Bomb')
8% (1) CWE-284 Access Control (Authorization) Issues
8% (1) CWE-264 Permissions, Privileges, and Access Controls
8% (1) CWE-94 Failure to Control Generation of Code ('Code Injection')
8% (1) CWE-59 Improper Link Resolution Before File Access ('Link Following')

Snort® IPS/IDS

Date Description
2017-01-19 Ubuntu Apport CrashDB crash report code injection attempt
RuleID : 41041 - Type : OS-LINUX - Revision : 2
2017-01-19 Ubuntu Apport CrashDB crash report code injection attempt
RuleID : 41040 - Type : OS-LINUX - Revision : 2

Nessus® Vulnerability Scanner

id Description
2017-11-21 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-3480-2.nasl - Type: ACT_GATHER_INFO
2017-11-16 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-3480-1.nasl - Type: ACT_GATHER_INFO
2017-07-25 Name: The remote SUSE host is missing one or more security updates.
File: suse_SU-2017-1938-1.nasl - Type: ACT_GATHER_INFO
2017-07-19 Name: The remote Ubuntu host is missing one or more security-related patches.
File: ubuntu_USN-3354-1.nasl - Type: ACT_GATHER_INFO
2016-12-15 Name: The remote Ubuntu host is missing one or more security-related patches.
File: ubuntu_USN-3157-1.nasl - Type: ACT_GATHER_INFO
2015-09-25 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-2744-1.nasl - Type: ACT_GATHER_INFO
2015-04-15 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-2569-1.nasl - Type: ACT_GATHER_INFO