Vulnerability Details : CVE-2017-14180
Apport 2.13 through 2.20.7 does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges, a different vulnerability than CVE-2017-14179.
Vulnerability category: Denial of service
Products affected by CVE-2017-14180
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*
- cpe:2.3:a:apport_project:apport:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-14180
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-14180
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
7.8
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2017-14180
-
The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-14180
-
https://usn.ubuntu.com/usn/usn-3480-1
USN-3480-1: Apport vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://people.canonical.com/~ubuntu-security/cve/?cve=CVE-2017-14180
CVE-2017-14180 in UbuntuThird Party Advisory
-
https://launchpad.net/bugs/1726372
Bug #1726372 “Multiple security issues in Apport” : Bugs : apport package : UbuntuIssue Tracking;Third Party Advisory
-
https://bazaar.launchpad.net/~apport-hackers/apport/trunk/revision/3171
~apport-hackers/apport/trunk : revision 3171Issue Tracking;Third Party Advisory
Jump to