Upstream information
CVE-2015-3151 at MITRE
Description
Directory traversal vulnerability in abrt-dbus in Automatic Bug Reporting Tool (ABRT) allows local users to read, write to, or change ownership of arbitrary files via unspecified vectors to the (1) NewProblem, (2) GetInfo, (3) SetElement, or (4) DeleteElement method.
SUSE information
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having important severity.
CVSS v2 Scores
| National Vulnerability Database |
Base Score | 7.2 |
Vector | AV:L/AC:L/Au:N/C:C/I:C/A:C |
Access Vector | Local |
Access Complexity | Low |
Authentication | None |
Confidentiality Impact | Complete |
Integrity Impact | Complete |
Availability Impact | Complete |
CVSS v3 Scores
| National Vulnerability Database |
Base Score | 7.8 |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Attack Vector | Local |
Attack Complexity | Low |
Privileges Required | Low |
User Interaction | None |
Scope | Unchanged |
Confidentiality Impact | High |
Integrity Impact | High |
Availability Impact | High |
CVSSv3 Version | 3.1 |
No SUSE Bugzilla entries cross referenced.
No SUSE Security Announcements cross referenced.
List of released packages
Product(s) | Fixed package version(s) | References |
SUSE Liberty Linux 7 | abrt >= 2.1.11-22.el7_1
abrt-addon-ccpp >= 2.1.11-22.el7_1
abrt-addon-kerneloops >= 2.1.11-22.el7_1
abrt-addon-pstoreoops >= 2.1.11-22.el7_1
abrt-addon-python >= 2.1.11-22.el7_1
abrt-addon-upload-watch >= 2.1.11-22.el7_1
abrt-addon-vmcore >= 2.1.11-22.el7_1
abrt-addon-xorg >= 2.1.11-22.el7_1
abrt-cli >= 2.1.11-22.el7_1
abrt-console-notification >= 2.1.11-22.el7_1
abrt-dbus >= 2.1.11-22.el7_1
abrt-desktop >= 2.1.11-22.el7_1
abrt-devel >= 2.1.11-22.el7_1
abrt-gui >= 2.1.11-22.el7_1
abrt-gui-devel >= 2.1.11-22.el7_1
abrt-gui-libs >= 2.1.11-22.el7_1
abrt-libs >= 2.1.11-22.el7_1
abrt-python >= 2.1.11-22.el7_1
abrt-python-doc >= 2.1.11-22.el7_1
abrt-retrace-client >= 2.1.11-22.el7_1
abrt-tui >= 2.1.11-22.el7_1
libreport >= 2.1.11-23.el7_1
libreport-anaconda >= 2.1.11-23.el7_1
libreport-cli >= 2.1.11-23.el7_1
libreport-compat >= 2.1.11-23.el7_1
libreport-devel >= 2.1.11-23.el7_1
libreport-filesystem >= 2.1.11-23.el7_1
libreport-gtk >= 2.1.11-23.el7_1
libreport-gtk-devel >= 2.1.11-23.el7_1
libreport-newt >= 2.1.11-23.el7_1
libreport-plugin-bugzilla >= 2.1.11-23.el7_1
libreport-plugin-kerneloops >= 2.1.11-23.el7_1
libreport-plugin-logger >= 2.1.11-23.el7_1
libreport-plugin-mailx >= 2.1.11-23.el7_1
libreport-plugin-reportuploader >= 2.1.11-23.el7_1
libreport-plugin-ureport >= 2.1.11-23.el7_1
libreport-python >= 2.1.11-23.el7_1
libreport-web >= 2.1.11-23.el7_1
libreport-web-devel >= 2.1.11-23.el7_1
| Patchnames: RHSA-2015:1083 |
SUSE Timeline for this CVE
CVE page created: Thu Apr 16 17:41:56 2015
CVE page last modified: Mon Oct 30 17:17:10 2023