First published: Sat Dec 17 2016(Updated: )
An issue was discovered in Apport before 2.20.4. There is a path traversal issue in the Apport crash file "Package" and "SourcePackage" fields. These fields are used to build a path to the package specific hook files in the /usr/share/apport/package-hooks/ directory. An attacker can exploit this path traversal to execute arbitrary Python files from the local system.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Python 3 Apport | <=2.20.3 | |
Ubuntu | <=12.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9950 is classified as a medium severity vulnerability due to its path traversal nature that could allow unauthorized file access.
To fix CVE-2016-9950, update Apport to version 2.20.4 or later.
CVE-2016-9950 affects Apport versions prior to 2.20.4 and Ubuntu Linux versions up to 12.10.
CVE-2016-9950 is a path traversal vulnerability that allows an attacker to access unintended files.
Yes, CVE-2016-9950 can potentially be exploited remotely if an attacker can manipulate the Apport crash file.