### [CVE-2015-5287](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5287) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The abrt-hook-ccpp help program in Automatic Bug Reporting Tool (ABRT) before 2.7.1 allows local users with certain permissions to gain privileges via a symlink attack on a file with a predictable name, as demonstrated by /var/tmp/abrt/abrt-hax-coredump or /var/spool/abrt/abrt-hax-coredump. ### POC #### Reference - http://packetstormsecurity.com/files/154592/ABRT-sosreport-Privilege-Escalation.html - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html - https://www.exploit-db.com/exploits/38832/ #### Github - https://github.com/ARPSyndicate/cvemon