Severity
7.8HIGH
EPSS
0.8%
top 26.58%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 18
Latest updateMay 17

Description

An issue was discovered in Apport through 2.20.x. In apport/report.py, Apport sets the ExecutablePath field and it then uses the path to run package specific hooks without protecting against path traversal. This allows remote attackers to execute arbitrary code via a crafted .crash file.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

Ubuntuapport< 2.14.1-0ubuntu3.25+1

🔴Vulnerability Details

3
GHSA
GHSA-r8ph-m677-xqfj: An issue was discovered in Apport through 22022-05-17
OSV
CVE-2017-10708: An issue was discovered in Apport through 22017-07-18
CVEList
CVE-2017-10708: An issue was discovered in Apport through 22017-07-18

📋Vendor Advisories

2
Red Hat
openssh: Out of sequence NEWKEYS message can allow remote attacker to cause denial of service2018-01-24
Ubuntu
Apport vulnerability2017-07-18
CVE-2017-10708 (HIGH CVSS 7.8) | An issue was discovered in Apport t | cvebase.io