An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads the CrashDB field and it then evaluates the field as Python code if it begins with a "{". This allows remote attackers to execute arbitrary Python code.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2016-12-17T03:34:00
Updated: 2024-08-06T03:07:31.413Z
Reserved: 2016-12-14T00:00:00
Link: CVE-2016-9949
Vulnrichment
No data.
NVD
Status : Modified
Published: 2016-12-17T03:59:00.297
Modified: 2024-11-21T03:02:03.483
Link: CVE-2016-9949
Redhat
No data.