First published: Sat Dec 17 2016(Updated: )
An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads the CrashDB field and it then evaluates the field as Python code if it begins with a "{". This allows remote attackers to execute arbitrary Python code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Python 3 Apport | <=2.20.3 | |
Ubuntu | <=12.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9949 is classified as a critical vulnerability due to its potential for remote code execution.
To mitigate CVE-2016-9949, upgrade Apport to version 2.20.4 or later.
CVE-2016-9949 affects Apport versions prior to 2.20.4 and Ubuntu Linux versions up to 12.10.
Yes, CVE-2016-9949 can be exploited remotely by attackers to execute arbitrary Python code.
The impact of CVE-2016-9949 allows remote attackers to gain control over affected systems through arbitrary code execution.