vendor:
Ubuntu Linux
by:
Ricardo
7.2
CVSS
HIGH
Privilege Escalation
269
CWE
Product Name: Ubuntu Linux
Affected Version From: 2.14.1-0ubuntu3.8
Affected Version To: 2.14.1-0ubuntu3.8
Patch Exists: YES
Related CWE: CVE-2015-1318
CPE: o:ubuntu:ubuntu_linux:14.04.2
Metasploit:
N/A
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=82792, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/linux/local/apport_abrt_chroot_priv_esc, https://www.infosecmatter.com/nessus-plugin-library/?id=88587, https://www.infosecmatter.com/nessus-plugin-library/?id=86909, https://www.infosecmatter.com/nessus-plugin-library/?id=89181, https://www.infosecmatter.com/nessus-plugin-library/?id=83238, https://www.infosecmatter.com/nessus-plugin-library/?id=83422, https://www.infosecmatter.com/nessus-plugin-library/?id=88629, https://www.infosecmatter.com/nessus-plugin-library/?id=81944, https://www.infosecmatter.com/nessus-plugin-library/?id=93169
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2015
CVE-2015-1318
This exploit is a privilege escalation vulnerability in Apport, a crash reporting system used in Ubuntu. It allows a local user to gain root privileges by exploiting a race condition in the Apport crash handler. The vulnerability is caused by a race condition between the setuid() and execve() system calls. The exploit creates a malicious Apport crash handler script, which is then executed by the Apport crash handler. The malicious script then creates a setuid root shell, which is then executed by the Apport crash handler.
Mitigation:
The vulnerability can be mitigated by applying the patch provided by Ubuntu. The patch ensures that the setuid() system call is executed before the execve() system call.