CVE-2017-14177
Publication date 15 November 2017
Last updated 25 August 2025
Ubuntu priority
Cvss 3 Severity Score
Description
Apport through 2.20.7 does not properly handle core dumps from setuid binaries allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1324.
Status
Package | Ubuntu Release | Status |
---|---|---|
apport | ||
16.04 LTS xenial |
Fixed 2.20.1-0ubuntu2.12
|
|
14.04 LTS trusty |
Fixed 2.14.1-0ubuntu3.27
|
Patch details
Package | Patch details |
---|---|
apport |
Severity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-3480-1
- Apport vulnerabilities
- 15 November 2017