LOW · 3.8

CVE-2019-11481

Kevin Backhouse discovered that apport would read a user-supplied configuration file with elevated privileges. By replacing the file with a symbolic link, a user could get apport to read any file on t...

Vulnerability Description

Kevin Backhouse discovered that apport would read a user-supplied configuration file with elevated privileges. By replacing the file with a symbolic link, a user could get apport to read any file on the system as root, with unknown consequences.

CVSS Score

3.8

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality
LOW
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
CanonicalUbuntu Linux14.04
Apport ProjectApport-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2019-11481?

CVE-2019-11481 is a vulnerability with a CVSS score of 3.8 (LOW). Kevin Backhouse discovered that apport would read a user-supplied configuration file with elevated privileges. By replacing the file with a symbolic link, a user could get apport to read any file on t...

How severe is CVE-2019-11481?

CVE-2019-11481 has been rated LOW with a CVSS base score of 3.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2019-11481?

Check the references section above for vendor advisories and patch information. Affected products include: Canonical Ubuntu Linux, Apport Project Apport.