cve/2015/CVE-2015-1324.md

19 lines
927 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2015-1324](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1324)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Apport before 2.17.2-0ubuntu1.1 as packaged in Ubuntu 15.04, before 2.14.70ubuntu8.5 as packaged in Ubuntu 14.10, before 2.14.1-0ubuntu3.11 as packaged in Ubuntu 14.04 LTS, and before 2.0.1-0ubuntu17.9 as packaged in Ubuntu 12.04 LTS allow local users to write to arbitrary files and gain root privileges by leveraging incorrect handling of permissions when generating core dumps for setuid binaries.
### POC
#### Reference
- http://www.ubuntu.com/usn/USN-2609-1
- https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1452239
#### Github
- https://github.com/ARPSyndicate/cvemon