First published: Fri Oct 25 2013(Updated: )
Apport 2.12.5 and earlier uses weak permissions for core dump files created by setuid binaries, which allows local users to obtain sensitive information by reading the file.
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Ubuntu | =13.04 | |
Ubuntu | =13.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1067 is rated as medium severity due to the potential exposure of sensitive information by local users.
To fix CVE-2013-1067, update to a version of Ubuntu that includes the patch for Apport, specifically versions after 2.12.5.
CVE-2013-1067 affects local users of Ubuntu Linux versions 12.04, 12.10, 13.04, and 13.10.
CVE-2013-1067 enables local users to access sensitive information through improperly secured core dump files.
No, CVE-2013-1067 is a local vulnerability that requires an authenticated user to exploit.