The default event handling scripts in Automatic Bug Reporting Tool (ABRT) allow local users to gain privileges as demonstrated by a symlink attack on a var_log_messages file.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2015/04/17/5 | Mailing List Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1212861 | Issue Tracking Third Party Advisory |
https://github.com/abrt/abrt/commit/3287aa12eb205cff95cdd00d6d6c5c9a4f8f0eca | Patch Third Party Advisory |
https://github.com/abrt/abrt/commit/7417505e1d93cc95ec648b74e3c801bc67aacb9f | Patch Third Party Advisory |
Configurations
History
13 Feb 2023, 00:47
Type | Values Removed | Values Added |
---|---|---|
Summary | The default event handling scripts in Automatic Bug Reporting Tool (ABRT) allow local users to gain privileges as demonstrated by a symlink attack on a var_log_messages file. | |
References |
|
02 Feb 2023, 20:20
Type | Values Removed | Values Added |
---|---|---|
Summary | It was discovered that the default event handling scripts installed by ABRT did not handle symbolic links correctly. A local attacker with write access to an ABRT problem directory could use this flaw to escalate their privileges. | |
References |
|
Information
Published : 2020-01-14 18:15
Updated : 2023-12-10 13:13
NVD link : CVE-2015-1869
Mitre link : CVE-2015-1869
CVE.ORG link : CVE-2015-1869
JSON object : View
Products Affected
redhat
- automatic_bug_reporting_tool
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')