CVE-2020-15702
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
06/08/2020
Last modified:
27/01/2023
Description
TOCTOU Race Condition vulnerability in apport allows a local attacker to escalate privileges and execute arbitrary code. An attacker may exit the crashed process and exploit PID recycling to spawn a root process with the same PID as the crashed process, which can then be used to escalate privileges. Fixed in 2.20.1-0ubuntu2.24, 2.20.9 versions prior to 2.20.9-0ubuntu7.16 and 2.20.11 versions prior to 2.20.11-0ubuntu27.6. Was ZDI-CAN-11234.
Impact
Base Score 3.x
7.00
Severity 3.x
HIGH
Base Score 2.0
4.40
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu8:*:*:*:*:*:*:* | ||
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu9:*:*:*:*:*:*:* | ||
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu10:*:*:*:*:*:*:* | ||
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu11:*:*:*:*:*:*:* | ||
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu12:*:*:*:*:*:*:* | ||
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu13:*:*:*:*:*:*:* | ||
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu14:*:*:*:*:*:*:* | ||
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu15:*:*:*:*:*:*:* | ||
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu16:*:*:*:*:*:*:* | ||
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu17:*:*:*:*:*:*:* | ||
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu18:*:*:*:*:*:*:* | ||
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu19:*:*:*:*:*:*:* | ||
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu20:*:*:*:*:*:*:* | ||
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu21:*:*:*:*:*:*:* | ||
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu22:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page