CVE-2016-9949
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
17/12/2016
Last modified:
12/04/2025
Description
An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads the CrashDB field and it then evaluates the field as Python code if it begins with a "{". This allows remote attackers to execute arbitrary Python code.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:apport_project:apport:*:*:*:*:*:*:*:* | 2.20.3 (including) | |
cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:*:*:*:* | 12.10 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.securityfocus.com/bid/95011
- http://www.ubuntu.com/usn/USN-3157-1
- https://bugs.launchpad.net/apport/+bug/1648806
- https://donncha.is/2016/12/compromising-ubuntu-desktop/
- https://github.com/DonnchaC/ubuntu-apport-exploitation
- https://www.exploit-db.com/exploits/40937/
- http://www.securityfocus.com/bid/95011
- http://www.ubuntu.com/usn/USN-3157-1
- https://bugs.launchpad.net/apport/+bug/1648806
- https://donncha.is/2016/12/compromising-ubuntu-desktop/
- https://github.com/DonnchaC/ubuntu-apport-exploitation
- https://www.exploit-db.com/exploits/40937/