Jakub Filak

10 exploits Active since Dec 2015
CVE-2015-1869 WRITEUP HIGH WRITEUP
Redhat Automatic Bug Reporting Tool - Symlink Following
The default event handling scripts in Automatic Bug Reporting Tool (ABRT) allow local users to gain privileges as demonstrated by a symlink attack on a var_log_messages file.
CVSS 7.8
CVE-2015-1870 WRITEUP MEDIUM WRITEUP
Redhat Automatic Bug Reporting Tool < 2.1.11 - Information Disclosure
The event scripts in Automatic Bug Reporting Tool (ABRT) uses world-readable permission on a copy of sosreport file in problem directories, which allows local users to obtain sensitive information from /var/log/messages via unspecified vectors.
CVSS 5.5
CVE-2015-1870 WRITEUP MEDIUM WRITEUP
Redhat Automatic Bug Reporting Tool < 2.1.11 - Information Disclosure
The event scripts in Automatic Bug Reporting Tool (ABRT) uses world-readable permission on a copy of sosreport file in problem directories, which allows local users to obtain sensitive information from /var/log/messages via unspecified vectors.
CVSS 5.5
CVE-2015-3147 WRITEUP MEDIUM WRITEUP
ABRT - Local Privilege Escalation
daemon/abrt-handle-upload.in in Automatic Bug Reporting Tool (ABRT), when moving problem reports from /var/spool/abrt-upload, allows local users to write to arbitrary files or possibly have other unspecified impact via a symlink attack on (1) /var/spool/abrt or (2) /var/tmp/abrt.
CVSS 6.5
CVE-2015-3150 WRITEUP HIGH WRITEUP
abrt-dbus - Local Privilege Escalation
abrt-dbus in Automatic Bug Reporting Tool (ABRT) allows local users to delete or change the ownership of arbitrary files via the problem directory argument to the (1) ChownProblemDir, (2) DeleteElement, or (3) DeleteProblem method.
CVSS 7.1
CVE-2015-3150 WRITEUP HIGH WRITEUP
abrt-dbus - Local Privilege Escalation
abrt-dbus in Automatic Bug Reporting Tool (ABRT) allows local users to delete or change the ownership of arbitrary files via the problem directory argument to the (1) ChownProblemDir, (2) DeleteElement, or (3) DeleteProblem method.
CVSS 7.1
CVE-2015-3151 WRITEUP HIGH WRITEUP
ABRT - Path Traversal
Directory traversal vulnerability in abrt-dbus in Automatic Bug Reporting Tool (ABRT) allows local users to read, write to, or change ownership of arbitrary files via unspecified vectors to the (1) NewProblem, (2) GetInfo, (3) SetElement, or (4) DeleteElement method.
CVSS 7.8
CVE-2015-3151 WRITEUP HIGH WRITEUP
ABRT - Path Traversal
Directory traversal vulnerability in abrt-dbus in Automatic Bug Reporting Tool (ABRT) allows local users to read, write to, or change ownership of arbitrary files via unspecified vectors to the (1) NewProblem, (2) GetInfo, (3) SetElement, or (4) DeleteElement method.
CVSS 7.8
CVE-2015-3159 WRITEUP HIGH WRITEUP
ABRT - Privilege Escalation
The abrt-action-install-debuginfo-to-abrt-cache help program in Automatic Bug Reporting Tool (ABRT) does not properly handle the process environment before invoking abrt-action-install-debuginfo, which allows local users to gain privileges.
CVSS 7.8
CVE-2015-5273 WRITEUP WRITEUP
ABRT <2.7.1 - Local File Write
The abrt-action-install-debuginfo-to-abrt-cache help program in Automatic Bug Reporting Tool (ABRT) before 2.7.1 allows local users to write to arbitrary files via a symlink attack on unpacked.cpio in a pre-created directory with a predictable name in /var/tmp.