CVE-2015-7529Link Following in Project SOS

Severity
7.8HIGHNVD
OSV5.0
EPSS
0.1%
top 82.05%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 6
Latest updateMay 13

Description

sosreport in SoS 3.x allows local users to obtain sensitive information from sosreport files or gain privileges via a symlink attack on an archive file in a temporary directory, as demonstrated by sosreport-$hostname-$date.tar in /tmp/sosreport-$hostname-$date.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

Also affects: Ubuntu Linux 14.04, 15.04, 15.10, Enterprise Linux 7.2, 7.3, 7.4, 7.6, 7.7, 6.7, 7.5

Patches

🔴Vulnerability Details

5
OSV
SoSReport Predictable Tmp File Names2022-05-13
GHSA
SoSReport Predictable Tmp File Names2022-05-13
OSV
CVE-2015-7529: sosreport in SoS 32017-11-06
CVEList
CVE-2015-7529: sosreport in SoS 32017-11-06
OSV
sosreport vulnerabilities2015-12-18

📋Vendor Advisories

3
Ubuntu
SoS vulnerabilities2015-12-18
Red Hat
sos: Usage of predictable temporary files allows privilege escalation2015-12-01
Debian
CVE-2015-7529: sosreport - sosreport in SoS 3.x allows local users to obtain sensitive information from sos...2015

💬Community

2
Bugzilla
CVE-2015-7529 sos: Usage of predictable temporary files allows privilege escalation [fedora-all]2015-12-01
Bugzilla
CVE-2015-7529 sos: Usage of predictable temporary files allows privilege escalation2015-11-16
CVE-2015-7529 — Link Following in SOS Project SOS | cvebase