ID CVE-2016-9949
Summary An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads the CrashDB field and it then evaluates the field as Python code if it begins with a "{". This allows remote attackers to execute arbitrary Python code.
References
Vulnerable Configurations
  • cpe:2.3:a:apport_project:apport:-:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:-:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:0.13:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:0.13:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.9.4:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.9.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.9.5:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.9.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.9.6:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.9.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.10:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.10.1:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.10.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.11:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.11:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.12:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.12:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.12.1:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.12.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.13.1:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.13.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.13.2:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.13.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.13.3:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.13.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.14:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.14:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.15:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.15:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.16:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.16:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.17:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.17:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.17.1:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.17.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.17.2:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.17.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.18:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.18:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.20.1:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.20.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.21:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.21:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.21.1:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.21.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.21.2:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.21.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.21.3:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.21.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.22:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.22:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.22.1:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.22.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.23:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.23:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.23.1:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.23.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.24:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.24:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.25:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.25:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.26:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.26:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.90:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.90:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.91:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.91:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.92:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.92:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.93:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.93:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.94:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.94:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.94.1:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.94.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:1.95:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:1.95:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.1:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.2:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.3:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.4:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.5:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.6:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.7:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.8:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.9:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.9.2:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.9.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.10:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.10.1:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.10.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.10.2:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.10.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.11:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.11:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.12:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.12:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.12.1:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.12.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.12.2:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.12.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.12.3:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.12.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.12.4:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.12.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.12.5:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.12.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.12.6:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.12.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.12.7:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.12.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.13:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.13:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.13.1:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.13.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.13.2:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.13.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.13.3:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.13.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.14:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.14:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.14.1:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.14.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.14.2:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.14.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.14.3:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.14.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.14.4:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.14.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.14.5:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.14.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.14.6:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.14.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.14.7:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.14.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.15:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.15:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.15.1:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.15.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.16:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.16:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.16.1:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.16.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.16.2:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.16.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.17:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.17:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.17.1:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.17.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.17.2:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.17.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.17.3:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.17.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.18:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.18:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.18.1:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.18.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.19:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.19:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.19.1:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.19.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.19.2:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.19.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.19.3:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.19.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.19.4:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.19.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.20:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.20:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.20.1:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.20.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.20.2:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.20.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apport_project:apport:2.20.3:*:*:*:*:*:*:*
    cpe:2.3:a:apport_project:apport:2.20.3:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:6.06:-:lts:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:6.06:-:lts:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:6.06.1:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:6.06.1:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:6.06.1:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:6.06.1:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:6.06.2:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:6.06.2:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:6.06.2:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:6.06.2:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:8.04.1:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:8.04.1:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:8.04.1:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:8.04.1:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:8.04.2:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:8.04.2:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:8.04.2:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:8.04.2:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:8.04.3:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:8.04.3:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:8.04.3:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:8.04.3:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:8.04.4:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:8.04.4:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:8.04.4:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:8.04.4:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:10.04.1:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:10.04.1:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:10.04.1:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:10.04.1:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:10.04.2:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:10.04.2:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:10.04.2:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:10.04.2:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:10.04.3:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:10.04.3:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:10.04.3:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:10.04.3:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:10.04.4:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:10.04.4:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:10.04.4:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:10.04.4:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:12.04.1:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:12.04.1:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:12.04.1:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:12.04.1:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:12.04.2:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:12.04.2:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:12.04.2:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:12.04.2:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:12.04.3:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:12.04.3:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:12.04.3:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:12.04.3:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:12.04.4:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:12.04.4:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:12.04.4:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:12.04.4:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:12.04.5:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:12.04.5:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:12.04.5:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:12.04.5:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
CVSS
Base: 9.3 (as of 07-01-2017 - 03:00)
Impact:
Exploitability:
CWE CWE-94
CAPEC
  • Code Injection
    An adversary exploits a weakness in input validation on the target to inject new code into that which is currently executing. This differs from code inclusion in that code inclusion involves the addition or replacement of a reference to a code file, which is subsequently loaded by the target and used as part of the code of some application.
  • Leverage Executable Code in Non-Executable Files
    An attack of this type exploits a system's trust in configuration and resource files. When the executable loads the resource (such as an image file or configuration file) the attacker has modified the file to either execute malicious code directly or manipulate the target process (e.g. application server) to execute based on the malicious configuration parameters. Since systems are increasingly interrelated mashing up resources from local and remote sources the possibility of this attack occurring is high.
  • Manipulating User-Controlled Variables
    This attack targets user controlled variables (DEBUG=1, PHP Globals, and So Forth). An attacker can override environment variables leveraging user-supplied, untrusted query variables directly used on the application server without any data sanitization. In extreme cases, the attacker can change variables controlling the business logic of the application. For instance, in languages like PHP, a number of poorly set default configurations may allow the user to override variables.
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:M/Au:N/C:C/I:C/A:C
refmap via4
bid 95011
exploit-db 40937
misc
ubuntu USN-3157-1
Last major update 07-01-2017 - 03:00
Published 17-12-2016 - 03:59
Last modified 07-01-2017 - 03:00
Back to Top