CVE-2015-5287

Impact:
Moderate
Public Date:
2015-11-23
Bugzilla:
1266837: CVE-2015-5287 abrt: incorrect permissions on /var/spool/abrt
It was discovered that the kernel-invoked coredump processor provided by ABRT did not handle symbolic links correctly when writing core dumps of ABRT programs to the ABRT dump directory (/var/spool/abrt). A local attacker with write access to an ABRT problem directory could use this flaw to escalate their privileges.

Find out more about CVE-2015-5287 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 6.9
Base Metrics AV:L/AC:M/Au:N/C:C/I:C/A:C
Access Vector Local
Access Complexity Medium
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 7 (abrt) RHSA-2015:2505 2015-11-23

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 6 abrt Not affected

Acknowledgements

Red Hat would like to thank Philip Pettersson of Samsung for reporting this issue.

Last Modified
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.