Donncha

3 exploits Active since Dec 2016
CVE-2016-9950 EXPLOITDB HIGH text WRITEUP
Apport < 2.20.3 - Path Traversal
An issue was discovered in Apport before 2.20.4. There is a path traversal issue in the Apport crash file "Package" and "SourcePackage" fields. These fields are used to build a path to the package specific hook files in the /usr/share/apport/package-hooks/ directory. An attacker can exploit this path traversal to execute arbitrary Python files from the local system.
CVSS 7.8
CVE-2016-9949 EXPLOITDB HIGH text WRITEUP
Apport < 2.20.3 - Code Injection
An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads the CrashDB field and it then evaluates the field as Python code if it begins with a "{". This allows remote attackers to execute arbitrary Python code.
CVSS 7.8
CVE-2016-9951 EXPLOITDB MEDIUM text WRITEUP
Apport < 2.20.3 - Improper Access Control
An issue was discovered in Apport before 2.20.4. A malicious Apport crash file can contain a restart command in `RespawnCommand` or `ProcCmdline` fields. This command will be executed if a user clicks the Relaunch button on the Apport prompt from the malicious crash file. The fix is to only show the Relaunch button on Apport crash files generated by local systems. The Relaunch button will be hidden when crash files are opened directly in Apport-GTK.
CVSS 6.5