First published: Mon Feb 13 2017(Updated: )
click/install.py in click does not require files in package filesystem tarballs to start with ./ (dot slash), which allows remote attackers to install an alternate security policy and gain privileges via a crafted package, as demonstrated by the test.mmrow app for Ubuntu phone.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu Python 3 Click | ||
Ubuntu | =14.04 | |
Ubuntu | =15.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8768 has a medium severity level due to its potential to allow unauthorized privilege escalation.
To fix CVE-2015-8768, ensure that the package filesystem tarballs start with './' to prevent the installation of unverified policy packages.
CVE-2015-8768 affects the Click framework used in Ubuntu Linux versions 14.04 and 15.04.
Yes, CVE-2015-8768 can be exploited remotely, allowing attackers to install modified packages that could lead to privilege escalation.
Exploiting CVE-2015-8768 can lead to unauthorized access and privilege escalation on affected systems.