CVE-2020-15702Time-of-check Time-of-use (TOCTOU) Race Condition in Apport

Severity
7.0HIGHNVD
EPSS
0.0%
top 86.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 6
Latest updateMay 24

Description

TOCTOU Race Condition vulnerability in apport allows a local attacker to escalate privileges and execute arbitrary code. An attacker may exit the crashed process and exploit PID recycling to spawn a root process with the same PID as the crashed process, which can then be used to escalate privileges. Fixed in 2.20.1-0ubuntu2.24, 2.20.9 versions prior to 2.20.9-0ubuntu7.16 and 2.20.11 versions prior to 2.20.11-0ubuntu27.6. Was ZDI-CAN-11234.

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.0 | Impact: 5.9

Affected Packages3 packages

CVEListV5canonical/apport2.20.12.20.1-0ubuntu2.24+2
Ubuntuapport_project/apport< 2.20.1-0ubuntu2.24+3
NVDcanonical/apport100 versions+99

Also affects: Ubuntu Linux 14.04

🔴Vulnerability Details

4
GHSA
GHSA-r8j7-rc3f-2wqq: TOCTOU Race Condition vulnerability in apport allows a local attacker to escalate privileges and execute arbitrary code2022-05-24
CVEList
TOCTOU in apport2020-08-06
OSV
CVE-2020-15702: TOCTOU Race Condition vulnerability in apport allows a local attacker to escalate privileges and execute arbitrary code2020-08-04
OSV
apport vulnerabilities2020-08-04

📋Vendor Advisories

2
Ubuntu
Apport vulnerabilities2020-09-02
Ubuntu
Apport vulnerabilities2020-08-04