First published: Fri Apr 17 2015(Updated: )
It was discovered that the default event handling scripts installed by abrt follow symbolic links, allowing local attackers with write access to an abrt problem directory to escalate their privileges, as demonstrated by a var_log_messages file which is a symbolic link to file in /etc/cron.hourly. Acknowledgement: This issue was discovered by Florian Weimer of Red Hat Product Security.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Automatic Bug Reporting Tool |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1869 has a severity rating of high with a score of 7.8.
To mitigate CVE-2015-1869, update the Automatic Bug Reporting Tool to the latest version that addresses this vulnerability.
CVE-2015-1869 is associated with a symlink attack that allows local users to gain elevated privileges.
The affected software for CVE-2015-1869 is the Red Hat Automatic Bug Reporting Tool.
CVE-2015-1869 can be exploited by local users on the affected system.