### [CVE-2015-1324](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1324) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Apport before 2.17.2-0ubuntu1.1 as packaged in Ubuntu 15.04, before 2.14.70ubuntu8.5 as packaged in Ubuntu 14.10, before 2.14.1-0ubuntu3.11 as packaged in Ubuntu 14.04 LTS, and before 2.0.1-0ubuntu17.9 as packaged in Ubuntu 12.04 LTS allow local users to write to arbitrary files and gain root privileges by leveraging incorrect handling of permissions when generating core dumps for setuid binaries. ### POC #### Reference - http://www.ubuntu.com/usn/USN-2609-1 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1452239 #### Github - https://github.com/ARPSyndicate/cvemon