Automatic Bug Reporting Tool (ABRT) allows local users to read, change the ownership of, or have other unspecified impact on arbitrary files via a symlink attack on (1) /var/tmp/abrt/*/maps, (2) /tmp/jvm-*/hs_error.log, (3) /proc/*/exe, (4) /etc/os-release in a chroot, or (5) an unspecified root directory related to librpm.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1211835 | issue tracking vdb entry third party advisory |
https://github.com/abrt/abrt/commit/80408e9e24a1c10f85fd969e1853e0f192157f92 | third party advisory patch |
http://www.openwall.com/lists/oss-security/2015/04/16/12 | third party advisory mailing list |
http://www.openwall.com/lists/oss-security/2015/04/14/4 | third party advisory mailing list |
http://rhn.redhat.com/errata/RHSA-2015-1083.html | third party advisory vendor advisory |
https://github.com/abrt/abrt/commit/17cb66b13997b0159b4253b3f5722db79f476d68 | third party advisory patch |
https://github.com/abrt/abrt/commit/d6e2f6f128cef4c21cb80941ae674c9842681aa7 | third party advisory patch |
http://www.securityfocus.com/bid/75117 | vdb entry third party advisory |
https://www.exploit-db.com/exploits/44097/ | exploit |
http://rhn.redhat.com/errata/RHSA-2015-1210.html | vendor advisory |
https://github.com/abrt/abrt/commit/4f2c1ddd3e3b81d2d5146b883115371f1cada9f9 | third party advisory patch |