Upstream information
CVE-2015-3147 at MITRE
Description
daemon/abrt-handle-upload.in in Automatic Bug Reporting Tool (ABRT), when moving problem reports from /var/spool/abrt-upload, allows local users to write to arbitrary files or possibly have other unspecified impact via a symlink attack on (1) /var/spool/abrt or (2) /var/tmp/abrt.
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having important severity.
CVSS v2 Scores
| CVSS detail |  National Vulnerability Database | 
| Base Score |  4.9 | 
| Vector |  AV:N/AC:M/Au:S/C:N/I:P/A:P | 
| Access Vector |  Network | 
| Access Complexity |  Medium | 
| Authentication |  Single | 
| Confidentiality Impact |  None | 
| Integrity Impact |  Partial | 
| Availability Impact |  Partial | 
CVSS v3 Scores
| CVSS detail |  National Vulnerability Database | 
| Base Score |  6.5 | 
| Vector |  CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N | 
| Attack Vector |  Network | 
| Attack Complexity |  Low | 
| Privileges Required |  Low | 
| User Interaction |  None | 
| Scope |  Unchanged | 
| Confidentiality Impact |  None | 
| Integrity Impact |  High | 
| Availability Impact |  None | 
| CVSSv3 Version |  3.1 | 
No SUSE Bugzilla entries cross referenced.
No SUSE Security Announcements cross referenced.
List of released packages
| Product(s) |  Fixed package version(s) |  References | 
| SUSE Liberty Linux 7 |  abrt >= 2.1.11-22.el7_1 
 abrt-addon-ccpp >= 2.1.11-22.el7_1 
 abrt-addon-kerneloops >= 2.1.11-22.el7_1 
 abrt-addon-pstoreoops >= 2.1.11-22.el7_1 
 abrt-addon-python >= 2.1.11-22.el7_1 
 abrt-addon-upload-watch >= 2.1.11-22.el7_1 
 abrt-addon-vmcore >= 2.1.11-22.el7_1 
 abrt-addon-xorg >= 2.1.11-22.el7_1 
 abrt-cli >= 2.1.11-22.el7_1 
 abrt-console-notification >= 2.1.11-22.el7_1 
 abrt-dbus >= 2.1.11-22.el7_1 
 abrt-desktop >= 2.1.11-22.el7_1 
 abrt-devel >= 2.1.11-22.el7_1 
 abrt-gui >= 2.1.11-22.el7_1 
 abrt-gui-devel >= 2.1.11-22.el7_1 
 abrt-gui-libs >= 2.1.11-22.el7_1 
 abrt-libs >= 2.1.11-22.el7_1 
 abrt-python >= 2.1.11-22.el7_1 
 abrt-python-doc >= 2.1.11-22.el7_1 
 abrt-retrace-client >= 2.1.11-22.el7_1 
 abrt-tui >= 2.1.11-22.el7_1 
 libreport >= 2.1.11-23.el7_1 
 libreport-anaconda >= 2.1.11-23.el7_1 
 libreport-cli >= 2.1.11-23.el7_1 
 libreport-compat >= 2.1.11-23.el7_1 
 libreport-devel >= 2.1.11-23.el7_1 
 libreport-filesystem >= 2.1.11-23.el7_1 
 libreport-gtk >= 2.1.11-23.el7_1 
 libreport-gtk-devel >= 2.1.11-23.el7_1 
 libreport-newt >= 2.1.11-23.el7_1 
 libreport-plugin-bugzilla >= 2.1.11-23.el7_1 
 libreport-plugin-kerneloops >= 2.1.11-23.el7_1 
 libreport-plugin-logger >= 2.1.11-23.el7_1 
 libreport-plugin-mailx >= 2.1.11-23.el7_1 
 libreport-plugin-reportuploader >= 2.1.11-23.el7_1 
 libreport-plugin-ureport >= 2.1.11-23.el7_1 
 libreport-python >= 2.1.11-23.el7_1 
 libreport-web >= 2.1.11-23.el7_1 
 libreport-web-devel >= 2.1.11-23.el7_1 
  |  Patchnames:  RHSA-2015:1083 | 
SUSE Timeline for this CVE
CVE page created: Thu Apr 16 17:41:56 2015
CVE page last modified: Mon Oct  6 18:22:37 2025