7.2
CVSSv2

CVE-2017-14177

Published: 02/02/2018 Updated: 15/02/2018
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Apport up to and including 2.20.7 does not properly handle core dumps from setuid binaries allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1324.

Vulnerable Product Search on Vulmon Subscribe to Product

apport project apport

canonical ubuntu linux 17.10

canonical ubuntu linux 16.04

canonical ubuntu linux 18.04

canonical ubuntu linux 17.04

canonical ubuntu linux 14.04

Vendor Advisories

USN-3480-2 introduced regressions in Apport ...
Apport could be tricked into creating files as an administrator, resulting in denial of service or privilege escalation ...
USN-3480-1 introduced regressions in Apport ...