Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.871509
Categoría:Red Hat Local Security Checks
Título:RedHat Update for abrt and libreport RHSA-2015:2505-01
Resumen:The remote host is missing an update for the 'abrt and libreport'; package(s) announced via the referenced advisory.
Descripción:Summary:
The remote host is missing an update for the 'abrt and libreport'
package(s) announced via the referenced advisory.

Vulnerability Insight:
ABRT (Automatic Bug Reporting Tool) is a
tool to help users to detect defects in applications and to create a bug report
with all the information needed by a maintainer to fix it. It uses a plug-in
system to extend its functionality. libreport provides an API for reporting
different problems in applications to different bug targets, such as Bugzilla,
FTP, and Trac.

It was found that the ABRT debug information installer
(abrt-action-install-debuginfo-to-abrt-cache) did not use temporary
directories in a secure way. A local attacker could use the flaw to create
symbolic links and files at arbitrary locations as the abrt user.
(CVE-2015-5273)

It was discovered that the kernel-invoked coredump processor provided by
ABRT did not handle symbolic links correctly when writing core dumps of
ABRT programs to the ABRT dump directory (/var/spool/abrt). A local
attacker with write access to an ABRT problem directory could use this flaw
to escalate their privileges. (CVE-2015-5287)

It was found that ABRT may have exposed unintended information to Red Hat
Bugzilla during crash reporting. A bug in the libreport library caused
changes made by a user in files included in a crash report to be discarded.
As a result, Red Hat Bugzilla attachments may contain data that was not
intended to be made public, including host names, IP addresses, or command
line options. (CVE-2015-5302)

This flaw did not affect default installations of ABRT on Red Hat
Enterprise Linux as they do not post data to Red Hat Bugzilla. This feature
can however be enabled, potentially impacting modified ABRT instances.

As a precaution, Red Hat has identified bugs filed by such non-default Red
Hat Enterprise Linux users of ABRT and marked them private.

Red Hat would like to thank Philip Pettersson of Samsung for reporting the
CVE-2015-5273 and CVE-2015-5287 issues. The CVE-2015-5302 issue was
discovered by Bastien Nocera of Red Hat.

All users of abrt and libreport are advised to upgrade to these updated
packages, which contain backported patches to correct these issues.

Affected Software/OS:
abrt and libreport on Red Hat Enterprise Linux Server (v. 7)

Solution:
Please Install the Updated Packages.

CVSS Score:
6.9

CVSS Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2015-5273
78113
http://www.securityfocus.com/bid/78113
FEDORA-2015-79c1758468
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172809.html
RHSA-2015:2505
http://rhn.redhat.com/errata/RHSA-2015-2505.html
[oss-security] 20151201 CVE-2015-5273 + CVE-2015-5287, abrt local root in Centos/Fedora/RHEL
http://www.openwall.com/lists/oss-security/2015/12/01/1
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
https://bugzilla.redhat.com/show_bug.cgi?id=1262252
https://github.com/abrt/abrt/commit/50ee8130fb4cd4ef1af7682a2c85dd99cb99424e
Common Vulnerability Exposure (CVE) ID: CVE-2015-5287
38832
https://www.exploit-db.com/exploits/38832/
78137
http://www.securityfocus.com/bid/78137
http://packetstormsecurity.com/files/154592/ABRT-sosreport-Privilege-Escalation.html
https://bugzilla.redhat.com/show_bug.cgi?id=1266837
https://github.com/abrt/abrt/commit/3c1b60cfa62d39e5fff5a53a5bc53dae189e740e
Common Vulnerability Exposure (CVE) ID: CVE-2015-5302
77685
http://www.securityfocus.com/bid/77685
FEDORA-2015-6542ab6d3a
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172695.html
RHSA-2015:2504
http://rhn.redhat.com/errata/RHSA-2015-2504.html
https://bugzilla.redhat.com/show_bug.cgi?id=1270903
https://github.com/abrt/libreport/commit/257578a23d1537a2d235aaa2b1488ee4f818e360
CopyrightCopyright (C) 2015 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.