Show plain JSON{"containers": {"cna": {"affected": [{"product": "Apport", "vendor": "Canonical", "versions": [{"lessThan": "2.20.1-0ubuntu2.23", "status": "affected", "version": "2.20.1", "versionType": "custom"}, {"lessThan": "2.20.9-0ubuntu7.14", "status": "affected", "version": "2.20.9", "versionType": "custom"}, {"changes": [{"at": "2.20.11-0ubuntu22", "status": "unaffected"}], "lessThan": "2.20.11-0ubuntu8.8", "status": "affected", "version": "2.20.11", "versionType": "custom"}]}], "credits": [{"lang": "en", "value": "Maximilien Bourgeteau"}], "datePublic": "2020-04-02T00:00:00", "descriptions": [{"lang": "en", "value": "Apport creates a world writable lock file with root ownership in the world writable /var/lock/apport directory. If the apport/ directory does not exist (this is not uncommon as /var/lock is a tmpfs), it will create the directory, otherwise it will simply continue execution using the existing directory. This allows for a symlink attack if an attacker were to create a symlink at /var/lock/apport, changing apport's lock file location. This file could then be used to escalate privileges, for example. Fixed in versions 2.20.1-0ubuntu2.23, 2.20.9-0ubuntu7.14, 2.20.11-0ubuntu8.8 and 2.20.11-0ubuntu22."}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-379", "description": "CWE-379 Creation of Temporary File in Directory with Incorrect Permissions", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2020-06-24T20:06:02", "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical"}, "references": [{"tags": ["x_refsource_CONFIRM"], "url": "https://launchpad.net/bugs/1862348"}, {"tags": ["x_refsource_CONFIRM"], "url": "https://usn.ubuntu.com/4315-1/"}, {"name": "USN-4315-2", "tags": ["vendor-advisory", "x_refsource_UBUNTU"], "url": "https://usn.ubuntu.com/4315-2/"}], "source": {"advisory": "https://usn.ubuntu.com/4315-1/", "defect": ["https://launchpad.net/bugs/1862348"], "discovery": "EXTERNAL"}, "title": "World writable root owned lock file created in user controllable location", "x_generator": {"engine": "Vulnogram 0.0.9"}, "x_legacyV4Record": {"CVE_data_meta": {"AKA": "", "ASSIGNER": "security@ubuntu.com", "DATE_PUBLIC": "2020-04-02T03:04:00.000Z", "ID": "CVE-2020-8831", "STATE": "PUBLIC", "TITLE": "World writable root owned lock file created in user controllable location"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "Apport", "version": {"version_data": [{"platform": "", "version_affected": "<", "version_name": "2.20.1", "version_value": "2.20.1-0ubuntu2.23"}, {"platform": "", "version_affected": "<", "version_name": "2.20.9", "version_value": "2.20.9-0ubuntu7.14"}, {"platform": "", "version_affected": "<", "version_name": "2.20.11", "version_value": "2.20.11-0ubuntu8.8"}, {"platform": "", "version_affected": "<", "version_name": "2.20.11", "version_value": "2.20.11-0ubuntu22"}]}}]}, "vendor_name": "Canonical"}]}}, "configuration": [], "credit": [{"lang": "eng", "value": "Maximilien Bourgeteau"}], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "Apport creates a world writable lock file with root ownership in the world writable /var/lock/apport directory. If the apport/ directory does not exist (this is not uncommon as /var/lock is a tmpfs), it will create the directory, otherwise it will simply continue execution using the existing directory. This allows for a symlink attack if an attacker were to create a symlink at /var/lock/apport, changing apport's lock file location. This file could then be used to escalate privileges, for example. Fixed in versions 2.20.1-0ubuntu2.23, 2.20.9-0ubuntu7.14, 2.20.11-0ubuntu8.8 and 2.20.11-0ubuntu22."}]}, "exploit": [], "generator": {"engine": "Vulnogram 0.0.9"}, "impact": {"cvss": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-379 Creation of Temporary File in Directory with Incorrect Permissions"}]}]}, "references": {"reference_data": [{"name": "https://launchpad.net/bugs/1862348", "refsource": "CONFIRM", "url": "https://launchpad.net/bugs/1862348"}, {"name": "https://usn.ubuntu.com/4315-1/", "refsource": "CONFIRM", "url": "https://usn.ubuntu.com/4315-1/"}, {"name": "USN-4315-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4315-2/"}]}, "solution": [], "source": {"advisory": "https://usn.ubuntu.com/4315-1/", "defect": ["https://launchpad.net/bugs/1862348"], "discovery": "EXTERNAL"}, "work_around": []}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-04T10:12:10.889Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://launchpad.net/bugs/1862348"}, {"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://usn.ubuntu.com/4315-1/"}, {"name": "USN-4315-2", "tags": ["vendor-advisory", "x_refsource_UBUNTU", "x_transferred"], "url": "https://usn.ubuntu.com/4315-2/"}]}]}, "cveMetadata": {"assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "assignerShortName": "canonical", "cveId": "CVE-2020-8831", "datePublished": "2020-04-22T21:15:18.418314Z", "dateReserved": "2020-02-10T00:00:00", "dateUpdated": "2024-09-16T19:00:55.009Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}