cvelist/2015/1xxx/CVE-2015-1870.json

153 lines
6.4 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2023-02-02 20:02:11 +00:00
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
2019-03-17 23:36:24 +00:00
"CVE_data_meta": {
"ID": "CVE-2015-1870",
2023-02-02 20:02:11 +00:00
"ASSIGNER": "secalert@redhat.com",
2019-03-17 23:36:24 +00:00
"STATE": "PUBLIC"
},
2023-02-02 20:02:11 +00:00
"description": {
"description_data": [
{
"lang": "eng",
"value": "It was found that the ABRT event scripts created a user-readable copy of an sosreport file in ABRT problem directories, and included excerpts of /var/log/messages selected by the user-controlled process name, leading to an information disclosure. The fix for this issue prevents non-privileged users from accessing any crash reports, even reports of crashes of processes owned by those users. Only administrators (the wheel group members) are allowed to access crash reports via the \"System\" tab in the ABRT GUI, or by running abrt-cli as root (that is, via \"sudo abrt-cli\" or \"su -c abrt-cli\")."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Exposure of Sensitive Information to an Unauthorized Actor",
"cweId": "CWE-200"
}
]
}
]
},
2019-03-17 23:36:24 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
2023-02-02 20:02:11 +00:00
"vendor_name": "Red Hat",
2019-03-17 23:36:24 +00:00
"product": {
"product_data": [
{
2023-02-02 20:02:11 +00:00
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:2.0.8-26.el6_6.1",
"version_affected": "!"
},
{
"version_value": "0:2.0.9-21.el6_6.1",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7",
2019-03-17 23:36:24 +00:00
"version": {
"version_data": [
{
2023-02-02 20:02:11 +00:00
"version_value": "0:2.1.11-22.el7_1",
"version_affected": "!"
},
{
"version_value": "0:2.1.11-23.el7_1",
"version_affected": "!"
2019-03-17 23:36:24 +00:00
}
]
}
}
]
2023-02-02 20:02:11 +00:00
}
2019-03-17 23:36:24 +00:00
}
]
}
},
"references": {
"reference_data": [
{
2023-02-02 20:02:11 +00:00
"url": "https://access.redhat.com/errata/RHSA-2015:1083",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2015:1083"
},
{
"url": "https://access.redhat.com/errata/RHSA-2015:1210",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2015:1210"
2019-03-17 23:36:24 +00:00
},
{
2023-02-02 20:02:11 +00:00
"url": "http://rhn.redhat.com/errata/RHSA-2015-1083.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2015-1083.html"
2019-03-17 23:36:24 +00:00
},
{
2023-02-02 20:02:11 +00:00
"url": "http://rhn.redhat.com/errata/RHSA-2015-1210.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2015-1210.html"
2019-03-17 23:36:24 +00:00
},
{
2023-02-02 20:02:11 +00:00
"url": "http://www.securityfocus.com/bid/75119",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/75119"
2019-03-17 23:36:24 +00:00
},
{
2023-02-02 20:02:11 +00:00
"url": "https://access.redhat.com/security/cve/CVE-2015-1870",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2015-1870"
2019-03-17 23:36:24 +00:00
},
{
2023-02-02 20:02:11 +00:00
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212868",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1212868"
2019-03-17 23:36:24 +00:00
},
{
2023-02-02 20:02:11 +00:00
"url": "https://github.com/abrt/abrt/commit/7d023c32a565e83306cddf34c894477b7aaf33d1",
"refsource": "MISC",
"name": "https://github.com/abrt/abrt/commit/7d023c32a565e83306cddf34c894477b7aaf33d1"
},
{
"url": "https://github.com/abrt/abrt/commit/8939398b82006ba1fec4ed491339fc075f43fc7c",
"refsource": "MISC",
"name": "https://github.com/abrt/abrt/commit/8939398b82006ba1fec4ed491339fc075f43fc7c"
},
{
"url": "https://github.com/abrt/libreport/commit/c962918bc70a61a8cc647898ee8b1ff1c14a87c5",
"refsource": "MISC",
"name": "https://github.com/abrt/libreport/commit/c962918bc70a61a8cc647898ee8b1ff1c14a87c5"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 2.1,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
2019-03-17 23:36:24 +00:00
}
]
}
}