An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads the CrashDB field and it then evaluates the field as Python code if it begins with a "{". This allows remote attackers to execute arbitrary Python code.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2016-12-17T03:34:00

Updated: 2024-08-06T03:07:31.413Z

Reserved: 2016-12-14T00:00:00

Link: CVE-2016-9949

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2016-12-17T03:59:00.297

Modified: 2017-01-07T03:00:45.917

Link: CVE-2016-9949

cve-icon Redhat

No data.