First published: Fri Aug 25 2017(Updated: )
Apport before 2.17.2-0ubuntu1.1 as packaged in Ubuntu 15.04, before 2.14.70ubuntu8.5 as packaged in Ubuntu 14.10, before 2.14.1-0ubuntu3.11 as packaged in Ubuntu 14.04 LTS, and before 2.0.1-0ubuntu17.9 as packaged in Ubuntu 12.04 LTS allow local users to write to arbitrary files and gain root privileges by leveraging incorrect handling of permissions when generating core dumps for setuid binaries.
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 | |
Ubuntu | =15.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1324 has been assigned a medium severity rating due to its potential for local privilege escalation.
To fix CVE-2015-1324, upgrade to the latest version of Apport as provided in the respective Ubuntu security updates.
CVE-2015-1324 affects Ubuntu versions 12.04 LTS, 14.04 LTS, 14.10, and 15.04 prior to their respective patched versions.
No, CVE-2015-1324 requires local access to exploit, making it a local privilege escalation vulnerability.
CVE-2015-1324 is categorized as a local privilege escalation vulnerability allowing unauthorized file writes.