CVE-2015-3315

HIGH

ABRT raceabrt Privilege Escalation

Title source: metasploit

Description

Automatic Bug Reporting Tool (ABRT) allows local users to read, change the ownership of, or have other unspecified impact on arbitrary files via a symlink attack on (1) /var/tmp/abrt/*/maps, (2) /tmp/jvm-*/hs_error.log, (3) /proc/*/exe, (4) /etc/os-release in a chroot, or (5) an unspecified root directory related to librpm.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Metasploit · rubylocallinux
https://www.exploit-db.com/exploits/44097
exploitdb WORKING POC VERIFIED
by Tavis Ormandy · clocallinux
https://www.exploit-db.com/exploits/36747
metasploit WORKING POC EXCELLENT
by Tavis Ormandy, bcoles · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/abrt_raceabrt_priv_esc.rb

Scores

CVSS v3 7.8
EPSS 0.0534
EPSS Percentile 90.1%
Attack Vector LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-59
Status published
Products (1)
redhat/automatic_bug_reporting_tool
Published Jun 26, 2017
Tracked Since Feb 18, 2026