Vulnerability Description
Apport through 2.20.7 does not properly handle core dumps from setuid binaries allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1324.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apport Project | Apport | <= 2.20.7 |
| Canonical | Ubuntu Linux | 14.04 |
Related Weaknesses (CWE)
References
- https://bazaar.launchpad.net/~apport-hackers/apport/trunk/revision/3171Issue TrackingThird Party Advisory
- https://launchpad.net/bugs/1726372Issue TrackingThird Party Advisory
- https://people.canonical.com/~ubuntu-security/cve/?cve=CVE-2017-14177Third Party Advisory
- https://usn.ubuntu.com/usn/usn-3480-1Third Party Advisory
- https://bazaar.launchpad.net/~apport-hackers/apport/trunk/revision/3171Issue TrackingThird Party Advisory
- https://launchpad.net/bugs/1726372Issue TrackingThird Party Advisory
- https://people.canonical.com/~ubuntu-security/cve/?cve=CVE-2017-14177Third Party Advisory
- https://usn.ubuntu.com/usn/usn-3480-1Third Party Advisory
FAQ
What is CVE-2017-14177?
CVE-2017-14177 is a vulnerability with a CVSS score of 7.8 (HIGH). Apport through 2.20.7 does not properly handle core dumps from setuid binaries allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via ...
How severe is CVE-2017-14177?
CVE-2017-14177 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-14177?
Check the references section above for vendor advisories and patch information. Affected products include: Apport Project Apport, Canonical Ubuntu Linux.