Privilege escalation in apport (Ubuntu package) - CVE-2018-6552

 

Privilege escalation in apport (Ubuntu package) - CVE-2018-6552

Published: June 5, 2018 / Updated: June 6, 2018


Vulnerability identifier: #VU13193
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-6552
CWE-ID: CWE-20
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: Canonical Ltd.
Affected software:
apport (Ubuntu package)

Detailed vulnerability description

The vulnerability allows a local attacker to gain elevated privileges or cause DoS condition on the target system.

The vulnerability exists in the apport package used in multiple releases of Ubuntu due to improper handling of core dumps by the affected software when certain files are missing from the /proc directory. A local attacker can send remove certain files from the /proc directory to gain root privileges, deploy malicious code that escapes containers, or cause the service to crash.


How to mitigate CVE-2018-6552

Install update from vendor's website.

Sources