First published: Sat Dec 17 2016(Updated: )
An issue was discovered in Apport before 2.20.4. A malicious Apport crash file can contain a restart command in `RespawnCommand` or `ProcCmdline` fields. This command will be executed if a user clicks the Relaunch button on the Apport prompt from the malicious crash file. The fix is to only show the Relaunch button on Apport crash files generated by local systems. The Relaunch button will be hidden when crash files are opened directly in Apport-GTK.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu Python3-apport | <=2.20.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9951 has a medium severity rating due to its potential for exploitation through malicious crash files.
To fix CVE-2016-9951, update Apport to version 2.20.4 or later.
CVE-2016-9951 affects users running Apport versions prior to 2.20.4.
The potential impacts of CVE-2016-9951 include unauthorized command execution if a user interacts with a malicious crash file.
CVE-2016-9951 is primarily a local vulnerability since it requires user interaction with a local crash file.