Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-15701 (GCVE-0-2020-15701)
Vulnerability from cvelistv5 – Published: 2020-08-06 22:50 – Updated: 2024-09-16 20:52
VLAI?
EPSS
Title
Unhandled exception in apport
Summary
An unhandled exception in check_ignored() in apport/report.py can be exploited by a local attacker to cause a denial of service. If the mtime attribute is a string value in apport-ignore.xml, it will trigger an unhandled exception, resulting in a crash. Fixed in 2.20.1-0ubuntu2.24, 2.20.9-0ubuntu7.16, 2.20.11-0ubuntu27.6.
Severity ?
5.5 (Medium)
CWE
- CWE-755 - Improper Handling of Exceptional Conditions
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
Credits
Seong-Joong Kim
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T13:22:30.677Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://usn.ubuntu.com/4449-1"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://launchpad.net/bugs/1877023"
},
{
"name": "USN-4449-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/4449-1/"
},
{
"name": "USN-4449-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/4449-2/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "apport",
"vendor": "Canonical",
"versions": [
{
"lessThan": "2.20.1-0ubuntu2.24",
"status": "affected",
"version": "2.20.1",
"versionType": "custom"
},
{
"lessThan": "2.20.9-0ubuntu7.16",
"status": "affected",
"version": "2.20.9",
"versionType": "custom"
},
{
"lessThan": "2.20.11-0ubuntu27.6",
"status": "affected",
"version": "2.20.11",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Seong-Joong Kim"
}
],
"datePublic": "2020-05-13T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "An unhandled exception in check_ignored() in apport/report.py can be exploited by a local attacker to cause a denial of service. If the mtime attribute is a string value in apport-ignore.xml, it will trigger an unhandled exception, resulting in a crash. Fixed in 2.20.1-0ubuntu2.24, 2.20.9-0ubuntu7.16, 2.20.11-0ubuntu27.6."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-755",
"description": "CWE-755 Improper Handling of Exceptional Conditions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-09-14T15:06:10.000Z",
"orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
"shortName": "canonical"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://usn.ubuntu.com/4449-1"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://launchpad.net/bugs/1877023"
},
{
"name": "USN-4449-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/4449-1/"
},
{
"name": "USN-4449-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/4449-2/"
}
],
"source": {
"advisory": "https://usn.ubuntu.com/4449-1",
"defect": [
"https://launchpad.net/bugs/1877023"
],
"discovery": "EXTERNAL"
},
"title": "Unhandled exception in apport",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"AKA": "",
"ASSIGNER": "security@ubuntu.com",
"DATE_PUBLIC": "2020-05-13T07:29:00.000Z",
"ID": "CVE-2020-15701",
"STATE": "PUBLIC",
"TITLE": "Unhandled exception in apport"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "apport",
"version": {
"version_data": [
{
"platform": "",
"version_affected": "\u003c",
"version_name": "2.20.1",
"version_value": "2.20.1-0ubuntu2.24"
},
{
"platform": "",
"version_affected": "\u003c",
"version_name": "2.20.9",
"version_value": "2.20.9-0ubuntu7.16"
},
{
"platform": "",
"version_affected": "\u003c",
"version_name": "2.20.11",
"version_value": "2.20.11-0ubuntu27.6"
}
]
}
}
]
},
"vendor_name": "Canonical"
}
]
}
},
"configuration": [],
"credit": [
{
"lang": "eng",
"value": "Seong-Joong Kim"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An unhandled exception in check_ignored() in apport/report.py can be exploited by a local attacker to cause a denial of service. If the mtime attribute is a string value in apport-ignore.xml, it will trigger an unhandled exception, resulting in a crash. Fixed in 2.20.1-0ubuntu2.24, 2.20.9-0ubuntu7.16, 2.20.11-0ubuntu27.6."
}
]
},
"exploit": [],
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-755 Improper Handling of Exceptional Conditions"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://usn.ubuntu.com/4449-1",
"refsource": "CONFIRM",
"url": "https://usn.ubuntu.com/4449-1"
},
{
"name": "https://launchpad.net/bugs/1877023",
"refsource": "CONFIRM",
"url": "https://launchpad.net/bugs/1877023"
},
{
"name": "USN-4449-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4449-1/"
},
{
"name": "USN-4449-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4449-2/"
}
]
},
"solution": [],
"source": {
"advisory": "https://usn.ubuntu.com/4449-1",
"defect": [
"https://launchpad.net/bugs/1877023"
],
"discovery": "EXTERNAL"
},
"work_around": []
}
}
},
"cveMetadata": {
"assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
"assignerShortName": "canonical",
"cveId": "CVE-2020-15701",
"datePublished": "2020-08-06T22:50:22.407Z",
"dateReserved": "2020-07-14T00:00:00.000Z",
"dateUpdated": "2024-09-16T20:52:16.329Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
GSD-2020-15701
Vulnerability from gsd - Updated: 2023-12-13 01:21Details
An unhandled exception in check_ignored() in apport/report.py can be exploited by a local attacker to cause a denial of service. If the mtime attribute is a string value in apport-ignore.xml, it will trigger an unhandled exception, resulting in a crash. Fixed in 2.20.1-0ubuntu2.24, 2.20.9-0ubuntu7.16, 2.20.11-0ubuntu27.6.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2020-15701",
"description": "An unhandled exception in check_ignored() in apport/report.py can be exploited by a local attacker to cause a denial of service. If the mtime attribute is a string value in apport-ignore.xml, it will trigger an unhandled exception, resulting in a crash. Fixed in 2.20.1-0ubuntu2.24, 2.20.9-0ubuntu7.16, 2.20.11-0ubuntu27.6.",
"id": "GSD-2020-15701",
"references": [
"https://www.suse.com/security/cve/CVE-2020-15701.html",
"https://ubuntu.com/security/CVE-2020-15701"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-15701"
],
"details": "An unhandled exception in check_ignored() in apport/report.py can be exploited by a local attacker to cause a denial of service. If the mtime attribute is a string value in apport-ignore.xml, it will trigger an unhandled exception, resulting in a crash. Fixed in 2.20.1-0ubuntu2.24, 2.20.9-0ubuntu7.16, 2.20.11-0ubuntu27.6.",
"id": "GSD-2020-15701",
"modified": "2023-12-13T01:21:43.586144Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"AKA": "",
"ASSIGNER": "security@ubuntu.com",
"DATE_PUBLIC": "2020-05-13T07:29:00.000Z",
"ID": "CVE-2020-15701",
"STATE": "PUBLIC",
"TITLE": "Unhandled exception in apport"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "apport",
"version": {
"version_data": [
{
"platform": "",
"version_affected": "\u003c",
"version_name": "2.20.1",
"version_value": "2.20.1-0ubuntu2.24"
},
{
"platform": "",
"version_affected": "\u003c",
"version_name": "2.20.9",
"version_value": "2.20.9-0ubuntu7.16"
},
{
"platform": "",
"version_affected": "\u003c",
"version_name": "2.20.11",
"version_value": "2.20.11-0ubuntu27.6"
}
]
}
}
]
},
"vendor_name": "Canonical"
}
]
}
},
"configuration": [],
"credit": [
{
"lang": "eng",
"value": "Seong-Joong Kim"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An unhandled exception in check_ignored() in apport/report.py can be exploited by a local attacker to cause a denial of service. If the mtime attribute is a string value in apport-ignore.xml, it will trigger an unhandled exception, resulting in a crash. Fixed in 2.20.1-0ubuntu2.24, 2.20.9-0ubuntu7.16, 2.20.11-0ubuntu27.6."
}
]
},
"exploit": [],
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-755 Improper Handling of Exceptional Conditions"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://usn.ubuntu.com/4449-1",
"refsource": "CONFIRM",
"url": "https://usn.ubuntu.com/4449-1"
},
{
"name": "https://launchpad.net/bugs/1877023",
"refsource": "CONFIRM",
"url": "https://launchpad.net/bugs/1877023"
},
{
"name": "USN-4449-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4449-1/"
},
{
"name": "USN-4449-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4449-2/"
}
]
},
"solution": [],
"source": {
"advisory": "https://usn.ubuntu.com/4449-1",
"defect": [
"https://launchpad.net/bugs/1877023"
],
"discovery": "EXTERNAL"
},
"work_around": []
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.7-0ubuntu3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.7-0ubuntu3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.7-0ubuntu4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.8-0ubuntu1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.8-0ubuntu2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.8-0ubuntu3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.8-0ubuntu4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.8-0ubuntu5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.8-0ubuntu6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.8-0ubuntu7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.8-0ubuntu8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.8-0ubuntu9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.8-0ubuntu10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.19.1-0ubuntu3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.19.2-0ubuntu1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.19.2-0ubuntu2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.19.2-0ubuntu3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.19.2-0ubuntu4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.19.2-0ubuntu5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.19.2-0ubuntu6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.19.2-0ubuntu7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.19.2-0ubuntu8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.19.2-0ubuntu9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.19.3-0ubuntu1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.19.3-0ubuntu2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.19.3-0ubuntu3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.19.4-0ubuntu1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.19.4-0ubuntu2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20-0ubuntu1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20-0ubuntu2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20-0ubuntu3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@ubuntu.com",
"ID": "CVE-2020-15701"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "An unhandled exception in check_ignored() in apport/report.py can be exploited by a local attacker to cause a denial of service. If the mtime attribute is a string value in apport-ignore.xml, it will trigger an unhandled exception, resulting in a crash. Fixed in 2.20.1-0ubuntu2.24, 2.20.9-0ubuntu7.16, 2.20.11-0ubuntu27.6."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-755"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://launchpad.net/bugs/1877023",
"refsource": "CONFIRM",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://launchpad.net/bugs/1877023"
},
{
"name": "https://usn.ubuntu.com/4449-1",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://usn.ubuntu.com/4449-1"
},
{
"name": "USN-4449-1",
"refsource": "UBUNTU",
"tags": [
"Vendor Advisory"
],
"url": "https://usn.ubuntu.com/4449-1/"
},
{
"name": "USN-4449-2",
"refsource": "UBUNTU",
"tags": [
"Vendor Advisory"
],
"url": "https://usn.ubuntu.com/4449-2/"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2023-01-24T02:45Z",
"publishedDate": "2020-08-06T23:15Z"
}
}
}
CNVD-2020-47578
Vulnerability from cnvd - Published: 2020-08-22
VLAI Severity ?
Title
Apport配置解析漏洞
Description
Apport是一款用于收集并反馈错误信息(当应用程序崩溃时操作系统认为有用的信息)的工具包。
Apport中存在安全漏洞,该漏洞源于程序未能正确地解析配置文件。本地攻击者可利用该漏洞造成拒绝服务(崩溃)。
Severity
低
Patch Name
Apport配置解析漏洞的补丁
Patch Description
Apport是一款用于收集并反馈错误信息(当应用程序崩溃时操作系统认为有用的信息)的工具包。
Apport中存在安全漏洞,该漏洞源于程序未能正确地解析配置文件。本地攻击者可利用该漏洞造成拒绝服务(崩溃)。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布了漏洞修复程序,请及时关注更新: https://ubuntu.com/security/notices/USN-4449-1
Reference
https://packetstormsecurity.com/files/158760/Ubuntu-Security-Notice-USN-4449-1.html
Impacted products
| Name | Apport Apport |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2020-15701",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2020-15701"
}
},
"description": "Apport\u662f\u4e00\u6b3e\u7528\u4e8e\u6536\u96c6\u5e76\u53cd\u9988\u9519\u8bef\u4fe1\u606f\uff08\u5f53\u5e94\u7528\u7a0b\u5e8f\u5d29\u6e83\u65f6\u64cd\u4f5c\u7cfb\u7edf\u8ba4\u4e3a\u6709\u7528\u7684\u4fe1\u606f\uff09\u7684\u5de5\u5177\u5305\u3002\n\nApport\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u6b63\u786e\u5730\u89e3\u6790\u914d\u7f6e\u6587\u4ef6\u3002\u672c\u5730\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u5d29\u6e83\uff09\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://ubuntu.com/security/notices/USN-4449-1",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2020-47578",
"openTime": "2020-08-22",
"patchDescription": "Apport\u662f\u4e00\u6b3e\u7528\u4e8e\u6536\u96c6\u5e76\u53cd\u9988\u9519\u8bef\u4fe1\u606f\uff08\u5f53\u5e94\u7528\u7a0b\u5e8f\u5d29\u6e83\u65f6\u64cd\u4f5c\u7cfb\u7edf\u8ba4\u4e3a\u6709\u7528\u7684\u4fe1\u606f\uff09\u7684\u5de5\u5177\u5305\u3002\r\n\r\nApport\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u6b63\u786e\u5730\u89e3\u6790\u914d\u7f6e\u6587\u4ef6\u3002\u672c\u5730\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u5d29\u6e83\uff09\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Apport\u914d\u7f6e\u89e3\u6790\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Apport Apport"
},
"referenceLink": "https://packetstormsecurity.com/files/158760/Ubuntu-Security-Notice-USN-4449-1.html",
"serverity": "\u4f4e",
"submitTime": "2020-08-06",
"title": "Apport\u914d\u7f6e\u89e3\u6790\u6f0f\u6d1e"
}
CVE-2020-15701
Vulnerability from fstec - Published: 04.08.2020
VLAI Severity ?
Title
Уязвимость функции check_ignored() службы регистрации ошибок Apport, позволяющая нарушителю вызвать отказ в обслуживании
Description
Уязвимость функции check_ignored() в apport/report.py службы регистрации ошибок Apport связана с некорректной обработкой исключительных состояний. Эксплуатация уязвимости может позволить нарушителю вызвать отказ в обслуживании
Severity ?
Vendor
Canonical Ltd., Novell Inc.
Software Name
Ubuntu, Suse Linux Enterprise Server, Apport
Software Version
16.04 LTS (Ubuntu), 18.04 LTS (Ubuntu), 11 SP4-LTSS (Suse Linux Enterprise Server), 20.04 LTS (Ubuntu), до 2.20.11 включительно (Apport)
Possible Mitigations
Обновление службы регистрации ошибок Apport до актуальной версии
Reference
https://ubuntu.com/security/notices/USN-4449-1
https://nvd.nist.gov/vuln/detail/CVE-2020-15701
https://www.suse.com/security/cve/CVE-2020-15701/
https://launchpad.net/bugs/1877023
CWE
CWE-755
{
"CVSS 2.0": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Canonical Ltd., Novell Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "16.04 LTS (Ubuntu), 18.04 LTS (Ubuntu), 11 SP4-LTSS (Suse Linux Enterprise Server), 20.04 LTS (Ubuntu), \u0434\u043e 2.20.11 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Apport)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0441\u043b\u0443\u0436\u0431\u044b \u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0430\u0446\u0438\u0438 \u043e\u0448\u0438\u0431\u043e\u043a Apport \u0434\u043e \u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "04.08.2020",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "13.09.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "12.08.2020",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2020-03838",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2020-15701",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Ubuntu, Suse Linux Enterprise Server, Apport",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Canonical Ltd. Ubuntu 16.04 LTS , Canonical Ltd. Ubuntu 18.04 LTS , Novell Inc. Suse Linux Enterprise Server 11 SP4-LTSS , Canonical Ltd. Ubuntu 20.04 LTS ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 check_ignored() \u0441\u043b\u0443\u0436\u0431\u044b \u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0430\u0446\u0438\u0438 \u043e\u0448\u0438\u0431\u043e\u043a Apport, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0430\u044f \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0430 \u0438\u0441\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0439 (CWE-755)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 check_ignored() \u0432 apport/report.py \u0441\u043b\u0443\u0436\u0431\u044b \u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0430\u0446\u0438\u0438 \u043e\u0448\u0438\u0431\u043e\u043a Apport \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u043e\u0439 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u043e\u0439 \u0438\u0441\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0439. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u0441\u0447\u0435\u0440\u043f\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://ubuntu.com/security/notices/USN-4449-1\nhttps://nvd.nist.gov/vuln/detail/CVE-2020-15701\nhttps://www.suse.com/security/cve/CVE-2020-15701/\nhttps://launchpad.net/bugs/1877023",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-755",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,9)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,5)"
}
FKIE_CVE-2020-15701
Vulnerability from fkie_nvd - Published: 2020-08-06 23:15 - Updated: 2024-11-21 05:06
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
An unhandled exception in check_ignored() in apport/report.py can be exploited by a local attacker to cause a denial of service. If the mtime attribute is a string value in apport-ignore.xml, it will trigger an unhandled exception, resulting in a crash. Fixed in 2.20.1-0ubuntu2.24, 2.20.9-0ubuntu7.16, 2.20.11-0ubuntu27.6.
References
| URL | Tags | ||
|---|---|---|---|
| security@ubuntu.com | https://launchpad.net/bugs/1877023 | Exploit, Issue Tracking, Third Party Advisory | |
| security@ubuntu.com | https://usn.ubuntu.com/4449-1 | Vendor Advisory | |
| security@ubuntu.com | https://usn.ubuntu.com/4449-1/ | Vendor Advisory | |
| security@ubuntu.com | https://usn.ubuntu.com/4449-2/ | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://launchpad.net/bugs/1877023 | Exploit, Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4449-1 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4449-1/ | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4449-2/ | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| canonical | apport | 2.20.11-0ubuntu8 | |
| canonical | apport | 2.20.11-0ubuntu9 | |
| canonical | apport | 2.20.11-0ubuntu10 | |
| canonical | apport | 2.20.11-0ubuntu11 | |
| canonical | apport | 2.20.11-0ubuntu12 | |
| canonical | apport | 2.20.11-0ubuntu13 | |
| canonical | apport | 2.20.11-0ubuntu14 | |
| canonical | apport | 2.20.11-0ubuntu15 | |
| canonical | apport | 2.20.11-0ubuntu16 | |
| canonical | apport | 2.20.11-0ubuntu17 | |
| canonical | apport | 2.20.11-0ubuntu18 | |
| canonical | apport | 2.20.11-0ubuntu19 | |
| canonical | apport | 2.20.11-0ubuntu20 | |
| canonical | apport | 2.20.11-0ubuntu21 | |
| canonical | apport | 2.20.11-0ubuntu22 | |
| canonical | apport | 2.20.11-0ubuntu23 | |
| canonical | apport | 2.20.11-0ubuntu24 | |
| canonical | apport | 2.20.11-0ubuntu25 | |
| canonical | apport | 2.20.11-0ubuntu26 | |
| canonical | apport | 2.20.11-0ubuntu27 | |
| canonical | apport | 2.20.11-0ubuntu27.2 | |
| canonical | apport | 2.20.11-0ubuntu27.3 | |
| canonical | apport | 2.20.11-0ubuntu27.4 | |
| canonical | apport | 2.20.11-0ubuntu27.5 | |
| canonical | ubuntu_linux | 20.04 | |
| canonical | apport | 2.20.7-0ubuntu3 | |
| canonical | apport | 2.20.7-0ubuntu3.1 | |
| canonical | apport | 2.20.7-0ubuntu4 | |
| canonical | apport | 2.20.8-0ubuntu1 | |
| canonical | apport | 2.20.8-0ubuntu2 | |
| canonical | apport | 2.20.8-0ubuntu3 | |
| canonical | apport | 2.20.8-0ubuntu4 | |
| canonical | apport | 2.20.8-0ubuntu5 | |
| canonical | apport | 2.20.8-0ubuntu6 | |
| canonical | apport | 2.20.8-0ubuntu7 | |
| canonical | apport | 2.20.8-0ubuntu8 | |
| canonical | apport | 2.20.8-0ubuntu9 | |
| canonical | apport | 2.20.8-0ubuntu10 | |
| canonical | apport | 2.20.9-0ubuntu1 | |
| canonical | apport | 2.20.9-0ubuntu2 | |
| canonical | apport | 2.20.9-0ubuntu3 | |
| canonical | apport | 2.20.9-0ubuntu4 | |
| canonical | apport | 2.20.9-0ubuntu5 | |
| canonical | apport | 2.20.9-0ubuntu6 | |
| canonical | apport | 2.20.9-0ubuntu7 | |
| canonical | apport | 2.20.9-0ubuntu7.1 | |
| canonical | apport | 2.20.9-0ubuntu7.2 | |
| canonical | apport | 2.20.9-0ubuntu7.3 | |
| canonical | apport | 2.20.9-0ubuntu7.4 | |
| canonical | apport | 2.20.9-0ubuntu7.5 | |
| canonical | apport | 2.20.9-0ubuntu7.6 | |
| canonical | apport | 2.20.9-0ubuntu7.7 | |
| canonical | apport | 2.20.9-0ubuntu7.8 | |
| canonical | apport | 2.20.9-0ubuntu7.9 | |
| canonical | apport | 2.20.9-0ubuntu7.10 | |
| canonical | apport | 2.20.9-0ubuntu7.11 | |
| canonical | apport | 2.20.9-0ubuntu7.12 | |
| canonical | apport | 2.20.9-0ubuntu7.13 | |
| canonical | apport | 2.20.9-0ubuntu7.14 | |
| canonical | apport | 2.20.9-0ubuntu7.15 | |
| canonical | ubuntu_linux | 18.04 | |
| canonical | apport | 2.19.1-0ubuntu3 | |
| canonical | apport | 2.19.2-0ubuntu1 | |
| canonical | apport | 2.19.2-0ubuntu2 | |
| canonical | apport | 2.19.2-0ubuntu3 | |
| canonical | apport | 2.19.2-0ubuntu4 | |
| canonical | apport | 2.19.2-0ubuntu5 | |
| canonical | apport | 2.19.2-0ubuntu6 | |
| canonical | apport | 2.19.2-0ubuntu7 | |
| canonical | apport | 2.19.2-0ubuntu8 | |
| canonical | apport | 2.19.2-0ubuntu9 | |
| canonical | apport | 2.19.3-0ubuntu1 | |
| canonical | apport | 2.19.3-0ubuntu2 | |
| canonical | apport | 2.19.3-0ubuntu3 | |
| canonical | apport | 2.19.4-0ubuntu1 | |
| canonical | apport | 2.19.4-0ubuntu2 | |
| canonical | apport | 2.20-0ubuntu1 | |
| canonical | apport | 2.20-0ubuntu2 | |
| canonical | apport | 2.20-0ubuntu3 | |
| canonical | apport | 2.20.1-0ubuntu1 | |
| canonical | apport | 2.20.1-0ubuntu2 | |
| canonical | apport | 2.20.1-0ubuntu2.1 | |
| canonical | apport | 2.20.1-0ubuntu2.2 | |
| canonical | apport | 2.20.1-0ubuntu2.4 | |
| canonical | apport | 2.20.1-0ubuntu2.5 | |
| canonical | apport | 2.20.1-0ubuntu2.6 | |
| canonical | apport | 2.20.1-0ubuntu2.7 | |
| canonical | apport | 2.20.1-0ubuntu2.8 | |
| canonical | apport | 2.20.1-0ubuntu2.9 | |
| canonical | apport | 2.20.1-0ubuntu2.10 | |
| canonical | apport | 2.20.1-0ubuntu2.12 | |
| canonical | apport | 2.20.1-0ubuntu2.13 | |
| canonical | apport | 2.20.1-0ubuntu2.14 | |
| canonical | apport | 2.20.1-0ubuntu2.15 | |
| canonical | apport | 2.20.1-0ubuntu2.16 | |
| canonical | apport | 2.20.1-0ubuntu2.17 | |
| canonical | apport | 2.20.1-0ubuntu2.18 | |
| canonical | apport | 2.20.1-0ubuntu2.19 | |
| canonical | apport | 2.20.1-0ubuntu2.20 | |
| canonical | apport | 2.20.1-0ubuntu2.21 | |
| canonical | apport | 2.20.1-0ubuntu2.22 | |
| canonical | apport | 2.20.1-0ubuntu2.23 | |
| canonical | ubuntu_linux | 16.04 | |
| canonical | ubuntu_linux | 14.04 | |
| canonical | ubuntu_linux | 16.04 | |
| canonical | ubuntu_linux | 18.04 | |
| canonical | ubuntu_linux | 20.04 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu8:*:*:*:*:*:*:*",
"matchCriteriaId": "F0580D85-61E7-446D-BB01-EFFD20A53FC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu9:*:*:*:*:*:*:*",
"matchCriteriaId": "D8DEF97E-C23C-431E-A017-29895305E666",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu10:*:*:*:*:*:*:*",
"matchCriteriaId": "5CF1FFD4-8088-4073-AF78-C2A177C0DFAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu11:*:*:*:*:*:*:*",
"matchCriteriaId": "0CC58CA6-54E2-4874-B327-838B19667FF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu12:*:*:*:*:*:*:*",
"matchCriteriaId": "00060D2D-78C2-46CD-903D-48337C4A1173",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu13:*:*:*:*:*:*:*",
"matchCriteriaId": "7DD7604E-CEAC-4B54-A708-F98738381288",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu14:*:*:*:*:*:*:*",
"matchCriteriaId": "6BD91FE7-01B8-479F-8180-6E152F2996C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu15:*:*:*:*:*:*:*",
"matchCriteriaId": "3DCF9BD3-B46E-4D58-B53F-3DE081164FDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu16:*:*:*:*:*:*:*",
"matchCriteriaId": "7F973F96-7AAD-44AB-90F0-D9F5DD7AFEE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu17:*:*:*:*:*:*:*",
"matchCriteriaId": "5E1A19B1-592C-48CF-B709-7CA573F40AF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu18:*:*:*:*:*:*:*",
"matchCriteriaId": "287EA905-4DF5-4AF7-9C70-3A9CECA714C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu19:*:*:*:*:*:*:*",
"matchCriteriaId": "479CEDFA-177B-413D-A9C1-2A16A9F9FB50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu20:*:*:*:*:*:*:*",
"matchCriteriaId": "7713D34D-046F-4627-80CA-B5CD63D41F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu21:*:*:*:*:*:*:*",
"matchCriteriaId": "A65605CF-2659-436E-9C96-E782F06992F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu22:*:*:*:*:*:*:*",
"matchCriteriaId": "F27734BE-C46A-4815-A801-1FF5493B324B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu23:*:*:*:*:*:*:*",
"matchCriteriaId": "8EEAE19B-2138-4AA5-BB3B-3150DF0818DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu24:*:*:*:*:*:*:*",
"matchCriteriaId": "0D4BE412-F045-4754-9EF8-2F00E68542A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu25:*:*:*:*:*:*:*",
"matchCriteriaId": "FB26172A-D9F3-47A4-AA7D-7FD2E8499670",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu26:*:*:*:*:*:*:*",
"matchCriteriaId": "388DDA89-BA36-45FE-864F-5810C3DF4093",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27:*:*:*:*:*:*:*",
"matchCriteriaId": "3D17E8C3-56FE-4719-B214-BA369D5EB6D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4FE45751-8E63-428B-A04B-1E842FB5BEEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9381CFDA-0772-43D7-8F14-A6E0577F49EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DEFB83E8-166C-4960-8AF1-DE210F4DE6DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F95414EB-487D-4E80-AE6C-CDBF0153807E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.7-0ubuntu3:*:*:*:*:*:*:*",
"matchCriteriaId": "AE3B37D5-6479-48A8-8E04-789778896053",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.7-0ubuntu3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7A4235DE-1EF0-490E-955E-BC61F0CB82EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.7-0ubuntu4:*:*:*:*:*:*:*",
"matchCriteriaId": "34638795-2AE2-48BA-9800-2407E2617B43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.8-0ubuntu1:*:*:*:*:*:*:*",
"matchCriteriaId": "88552AC8-4BD5-4652-BB36-BEF96EDE514F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.8-0ubuntu2:*:*:*:*:*:*:*",
"matchCriteriaId": "F00DEC01-B39C-42DA-AC36-39A0A153CF44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.8-0ubuntu3:*:*:*:*:*:*:*",
"matchCriteriaId": "82D8C1AF-6C55-4FA5-8937-6797E7E441C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.8-0ubuntu4:*:*:*:*:*:*:*",
"matchCriteriaId": "E147A0DA-3A64-4DC0-BB7A-83432FDA5F1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.8-0ubuntu5:*:*:*:*:*:*:*",
"matchCriteriaId": "FD68C5DD-AF3B-42BC-AB18-E03E43A27076",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.8-0ubuntu6:*:*:*:*:*:*:*",
"matchCriteriaId": "29EE4CB4-9CFE-4672-93F3-D135F98ADD56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.8-0ubuntu7:*:*:*:*:*:*:*",
"matchCriteriaId": "812471E0-35B8-454B-B9FB-539302606C80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.8-0ubuntu8:*:*:*:*:*:*:*",
"matchCriteriaId": "EF92AC2E-8043-4126-9CC9-1EC1EE77C68E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.8-0ubuntu9:*:*:*:*:*:*:*",
"matchCriteriaId": "F07FD0B9-AFF4-47BB-B2C9-B819D8526D12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.8-0ubuntu10:*:*:*:*:*:*:*",
"matchCriteriaId": "A2A4392D-D859-4906-AFE2-EC56DCE8B85D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu1:*:*:*:*:*:*:*",
"matchCriteriaId": "6890AEDE-8628-4467-BD78-9E28BD00CFD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu2:*:*:*:*:*:*:*",
"matchCriteriaId": "A3E475D2-7643-4F90-9A39-3C4C9C5882A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu3:*:*:*:*:*:*:*",
"matchCriteriaId": "31C813DA-01A9-4963-992C-77F21B045C61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu4:*:*:*:*:*:*:*",
"matchCriteriaId": "9432E171-BD9D-41E1-AAB3-2CA29FE2B07F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu5:*:*:*:*:*:*:*",
"matchCriteriaId": "234375CE-6C99-4973-BAC5-950016C789A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu6:*:*:*:*:*:*:*",
"matchCriteriaId": "1658CA25-4EB5-40D9-A1F3-78640EE58D07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7:*:*:*:*:*:*:*",
"matchCriteriaId": "DF9A6112-6920-4006-A353-30D942301D63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "81F07BD0-2C19-4895-8B3C-F956ED7568BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "59420BB6-11ED-43BA-95FA-E843B9F0BFD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D6C7998E-269B-40B1-9B73-99F22CB76A26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "86CB2D37-78BD-486D-B27B-6E588563000D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0B452791-E4F4-4165-B15B-205743EDE142",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "29CA8420-057C-4BF1-A5A5-E65C979F80D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6FF71FAA-2457-4B6D-8265-5E9E40FB5B46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A901840D-D35C-4DBB-B736-16066BA61016",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.9:*:*:*:*:*:*:*",
"matchCriteriaId": "8DC8A84E-204D-46FE-9455-E6EE28CBA02D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.10:*:*:*:*:*:*:*",
"matchCriteriaId": "B170FF62-8FE1-4E32-9CAB-6C2791842D4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.11:*:*:*:*:*:*:*",
"matchCriteriaId": "C3112FA6-E483-4A15-83A7-0DC086680D14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.12:*:*:*:*:*:*:*",
"matchCriteriaId": "1A7B0688-10F5-4FCC-B4C3-804BFC9F4572",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.13:*:*:*:*:*:*:*",
"matchCriteriaId": "9709BC6B-6432-47D3-AF3D-7D61230528E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.14:*:*:*:*:*:*:*",
"matchCriteriaId": "DEFA65E9-C2C5-4068-8B19-2087F54C75E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.15:*:*:*:*:*:*:*",
"matchCriteriaId": "62D8AD82-1A8F-450D-B3F5-05D86245A20F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:canonical:apport:2.19.1-0ubuntu3:*:*:*:*:*:*:*",
"matchCriteriaId": "6CDAC7C9-022F-4900-BA2B-E226118390B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.19.2-0ubuntu1:*:*:*:*:*:*:*",
"matchCriteriaId": "C7AD2FFF-C115-4B55-8FBE-7C53CE7F3E78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.19.2-0ubuntu2:*:*:*:*:*:*:*",
"matchCriteriaId": "E439577C-3E3C-4233-9276-B26C242F2ABC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.19.2-0ubuntu3:*:*:*:*:*:*:*",
"matchCriteriaId": "18D07534-D124-4A3F-BFC2-347E7D25B9C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.19.2-0ubuntu4:*:*:*:*:*:*:*",
"matchCriteriaId": "4419CE5F-6093-49F1-B400-3CADB1EA8017",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.19.2-0ubuntu5:*:*:*:*:*:*:*",
"matchCriteriaId": "E4EFA888-6A84-48A7-A1F5-6EA1A602940E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.19.2-0ubuntu6:*:*:*:*:*:*:*",
"matchCriteriaId": "3B7DA437-17C5-4169-B296-CA924663B37F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.19.2-0ubuntu7:*:*:*:*:*:*:*",
"matchCriteriaId": "39555DE8-5AE0-46DC-9DB5-56808D2D54A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.19.2-0ubuntu8:*:*:*:*:*:*:*",
"matchCriteriaId": "5666D2A8-C212-4616-A62B-60C6FABB6679",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.19.2-0ubuntu9:*:*:*:*:*:*:*",
"matchCriteriaId": "AB25DCC8-6FC7-4138-90AC-FAFF65E6DA10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.19.3-0ubuntu1:*:*:*:*:*:*:*",
"matchCriteriaId": "CE54A967-E6CB-4975-93E2-B74D0F34816C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.19.3-0ubuntu2:*:*:*:*:*:*:*",
"matchCriteriaId": "C6381C1D-994D-49E9-886F-9AAAEC01F72C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.19.3-0ubuntu3:*:*:*:*:*:*:*",
"matchCriteriaId": "7083F188-39C9-4A0F-B379-DBAA7C1F3E7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.19.4-0ubuntu1:*:*:*:*:*:*:*",
"matchCriteriaId": "55710F53-487F-40CD-941C-BC2BA837C2D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.19.4-0ubuntu2:*:*:*:*:*:*:*",
"matchCriteriaId": "754BC407-2C75-443F-A0A5-2081EED7628A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20-0ubuntu1:*:*:*:*:*:*:*",
"matchCriteriaId": "B7E607C3-7E63-42A4-BE0E-3DFE3B9DD700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20-0ubuntu2:*:*:*:*:*:*:*",
"matchCriteriaId": "FC25ED5C-B1A4-4104-A0C9-633FB58F6596",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20-0ubuntu3:*:*:*:*:*:*:*",
"matchCriteriaId": "04C71AA4-574A-4C32-97C3-D7291EF18B2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu1:*:*:*:*:*:*:*",
"matchCriteriaId": "46F1A838-4379-4CC4-BEAD-EC9C793B4E56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2:*:*:*:*:*:*:*",
"matchCriteriaId": "1CA3903E-EA8B-4B78-B5CF-42C4AA6626C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FFCDD843-C743-41E4-8743-62C6149B7BBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "59FA4F13-3CF6-412B-846F-AE7D57B5FAEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0BF1FE3C-DCF6-475F-BFFB-D445B960CA26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B2AEEADF-89B1-465A-ACCE-61B8F64BD8A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1EBB7136-7802-4DB5-84AF-C75CBFFA5A3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "404DDAC7-952E-43FF-8EEB-FA1FC1A503A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "63388BC6-4EE0-41E3-BC4F-A43B0C56494E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "7D54FC7A-CD2A-4904-A059-48A8E94954A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "88F73732-BEA3-45D3-ABEE-51B45C1511E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "B53A64B3-7522-4B05-BA0C-BD0F429362B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "CF5AF908-B66A-48AD-912D-CBD02A1878A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "FF1672BA-3685-4B75-BB46-9BB181EC4959",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "58BB5513-D96B-4AE1-911F-40E561341859",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "542F64D1-EB92-41B3-A1E3-98061D1966B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "5EF284A8-86B0-47AB-B404-D4714D4E769A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "43355789-13F9-4D12-81DB-EFCEA9183F2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "CC67992A-E0CB-43A8-A749-D91BB460D279",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "12BB46F2-6B36-44A2-AE15-CDBC4AEBCD95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "AAD912C7-D5B2-4AB5-9C27-979E8DE805CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "BE7A141A-8588-4743-AB78-502A9724C474",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "0A282E85-A145-496B-A600-77012F24F82F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An unhandled exception in check_ignored() in apport/report.py can be exploited by a local attacker to cause a denial of service. If the mtime attribute is a string value in apport-ignore.xml, it will trigger an unhandled exception, resulting in a crash. Fixed in 2.20.1-0ubuntu2.24, 2.20.9-0ubuntu7.16, 2.20.11-0ubuntu27.6."
},
{
"lang": "es",
"value": "Un atacante local puede explotar una excepci\u00f3n no manejada en la funci\u00f3n check_ignored() en el archivo apport/report.py para causar una denegaci\u00f3n de servicio. Si el atributo mtime es un valor de cadena en apport-ignore.xml, desencadenar\u00e1 una excepci\u00f3n no manejada, resultando en un bloqueo. Corregido en versiones 2.20.1-0ubuntu2.24, 2.20.9-0ubuntu7.16, 2.20.11-0ubuntu27.6"
}
],
"id": "CVE-2020-15701",
"lastModified": "2024-11-21T05:06:02.950",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "security@ubuntu.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-08-06T23:15:11.670",
"references": [
{
"source": "security@ubuntu.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://launchpad.net/bugs/1877023"
},
{
"source": "security@ubuntu.com",
"tags": [
"Vendor Advisory"
],
"url": "https://usn.ubuntu.com/4449-1"
},
{
"source": "security@ubuntu.com",
"tags": [
"Vendor Advisory"
],
"url": "https://usn.ubuntu.com/4449-1/"
},
{
"source": "security@ubuntu.com",
"tags": [
"Vendor Advisory"
],
"url": "https://usn.ubuntu.com/4449-2/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://launchpad.net/bugs/1877023"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://usn.ubuntu.com/4449-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://usn.ubuntu.com/4449-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://usn.ubuntu.com/4449-2/"
}
],
"sourceIdentifier": "security@ubuntu.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-755"
}
],
"source": "security@ubuntu.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-755"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-R3R2-RV2R-78WF
Vulnerability from github – Published: 2022-05-24 17:25 – Updated: 2023-01-24 03:30
VLAI?
Details
An unhandled exception in check_ignored() in apport/report.py can be exploited by a local attacker to cause a denial of service. If the mtime attribute is a string value in apport-ignore.xml, it will trigger an unhandled exception, resulting in a crash. Fixed in 2.20.1-0ubuntu2.24, 2.20.9-0ubuntu7.16, 2.20.11-0ubuntu27.6.
Severity ?
5.5 (Medium)
{
"affected": [],
"aliases": [
"CVE-2020-15701"
],
"database_specific": {
"cwe_ids": [
"CWE-755"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2020-08-06T23:15:00Z",
"severity": "LOW"
},
"details": "An unhandled exception in check_ignored() in apport/report.py can be exploited by a local attacker to cause a denial of service. If the mtime attribute is a string value in apport-ignore.xml, it will trigger an unhandled exception, resulting in a crash. Fixed in 2.20.1-0ubuntu2.24, 2.20.9-0ubuntu7.16, 2.20.11-0ubuntu27.6.",
"id": "GHSA-r3r2-rv2r-78wf",
"modified": "2023-01-24T03:30:17Z",
"published": "2022-05-24T17:25:04Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15701"
},
{
"type": "WEB",
"url": "https://launchpad.net/bugs/1877023"
},
{
"type": "WEB",
"url": "https://usn.ubuntu.com/4449-1"
},
{
"type": "WEB",
"url": "https://usn.ubuntu.com/4449-2"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…