Upstream information
CVE-2015-3147 at MITRE
Description
daemon/abrt-handle-upload.in in Automatic Bug Reporting Tool (ABRT), when moving problem reports from /var/spool/abrt-upload, allows local users to write to arbitrary files or possibly have other unspecified impact via a symlink attack on (1) /var/spool/abrt or (2) /var/tmp/abrt.
SUSE information
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having important severity.
CVSS v2 Scores
| National Vulnerability Database |
Base Score | 4.9 |
Vector | AV:N/AC:M/Au:S/C:N/I:P/A:P |
Access Vector | Network |
Access Complexity | Medium |
Authentication | Single |
Confidentiality Impact | None |
Integrity Impact | Partial |
Availability Impact | Partial |
CVSS v3 Scores
| National Vulnerability Database |
Base Score | 6.5 |
Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
Attack Vector | Network |
Attack Complexity | Low |
Privileges Required | Low |
User Interaction | None |
Scope | Unchanged |
Confidentiality Impact | None |
Integrity Impact | High |
Availability Impact | None |
CVSSv3 Version | 3.1 |
No SUSE Bugzilla entries cross referenced.
No SUSE Security Announcements cross referenced.
List of released packages
Product(s) | Fixed package version(s) | References |
SUSE Liberty Linux 7 | abrt >= 2.1.11-22.el7_1
abrt-addon-ccpp >= 2.1.11-22.el7_1
abrt-addon-kerneloops >= 2.1.11-22.el7_1
abrt-addon-pstoreoops >= 2.1.11-22.el7_1
abrt-addon-python >= 2.1.11-22.el7_1
abrt-addon-upload-watch >= 2.1.11-22.el7_1
abrt-addon-vmcore >= 2.1.11-22.el7_1
abrt-addon-xorg >= 2.1.11-22.el7_1
abrt-cli >= 2.1.11-22.el7_1
abrt-console-notification >= 2.1.11-22.el7_1
abrt-dbus >= 2.1.11-22.el7_1
abrt-desktop >= 2.1.11-22.el7_1
abrt-devel >= 2.1.11-22.el7_1
abrt-gui >= 2.1.11-22.el7_1
abrt-gui-devel >= 2.1.11-22.el7_1
abrt-gui-libs >= 2.1.11-22.el7_1
abrt-libs >= 2.1.11-22.el7_1
abrt-python >= 2.1.11-22.el7_1
abrt-python-doc >= 2.1.11-22.el7_1
abrt-retrace-client >= 2.1.11-22.el7_1
abrt-tui >= 2.1.11-22.el7_1
libreport >= 2.1.11-23.el7_1
libreport-anaconda >= 2.1.11-23.el7_1
libreport-cli >= 2.1.11-23.el7_1
libreport-compat >= 2.1.11-23.el7_1
libreport-devel >= 2.1.11-23.el7_1
libreport-filesystem >= 2.1.11-23.el7_1
libreport-gtk >= 2.1.11-23.el7_1
libreport-gtk-devel >= 2.1.11-23.el7_1
libreport-newt >= 2.1.11-23.el7_1
libreport-plugin-bugzilla >= 2.1.11-23.el7_1
libreport-plugin-kerneloops >= 2.1.11-23.el7_1
libreport-plugin-logger >= 2.1.11-23.el7_1
libreport-plugin-mailx >= 2.1.11-23.el7_1
libreport-plugin-reportuploader >= 2.1.11-23.el7_1
libreport-plugin-ureport >= 2.1.11-23.el7_1
libreport-python >= 2.1.11-23.el7_1
libreport-web >= 2.1.11-23.el7_1
libreport-web-devel >= 2.1.11-23.el7_1
| Patchnames: RHSA-2015:1083 |
SUSE Timeline for this CVE
CVE page created: Thu Apr 16 17:41:56 2015
CVE page last modified: Mon Oct 30 17:17:10 2023