Vulnerability Details : CVE-2015-1325
Potential exploit
Race condition in Apport before 2.17.2-0ubuntu1.1 as packaged in Ubuntu 15.04, before 2.14.70ubuntu8.5 as packaged in Ubuntu 14.10, before 2.14.1-0ubuntu3.11 as packaged in Ubuntu 14.04 LTS, and before 2.0.1-0ubuntu17.9 as packaged in Ubuntu 12.04 LTS allow local users to write to arbitrary files and gain root privileges.
Products affected by CVE-2015-1325
- cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-1325
0.86%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 73 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-1325
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.9
|
MEDIUM | AV:L/AC:M/Au:N/C:C/I:C/A:C |
3.4
|
10.0
|
NIST | |
7.0
|
HIGH | CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.0
|
5.9
|
NIST |
CWE ids for CVE-2015-1325
-
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-1325
-
http://www.openwall.com/lists/oss-security/2015/05/21/10
oss-security - CVE-2015-1325 apport race conditions / ubuntu local rootExploit;Mailing List;Third Party Advisory
-
http://www.securityfocus.com/bid/74769
Apport CVE-2015-1325 Local Privilege Escalation VulnerabilityThird Party Advisory;VDB Entry
-
http://www.ubuntu.com/usn/USN-2609-1
USN-2609-1: Apport vulnerabilities | Ubuntu security noticesPatch;Vendor Advisory
-
https://www.exploit-db.com/exploits/37088/
Apport (Ubuntu 14.04/14.10/15.04) - Race Condition Privilege EscalationExploit;Third Party Advisory;VDB Entry
Jump to