Description
A privilege escalation attack was found in apport-cli 2.26.0 and earlier which is similar to CVE-2023-26604. If a system is specially configured to allow unprivileged users to run sudo apport-cli, less is configured as the pager, and the terminal size can be set: a local attacker can escalate privilege. It is extremely unlikely that a system administrator would configure sudo to allow unprivileged users to perform this class of exploit.
Published: 2023-04-13
Score: 7.7 High
EPSS: 5.0% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-23584 A privilege escalation attack was found in apport-cli 2.26.0 and earlier which is similar to CVE-2023-26604. If a system is specially configured to allow unprivileged users to run sudo apport-cli, less is configured as the pager, and the terminal size can be set: a local attacker can escalate privilege. It is extremely unlikely that a system administrator would configure sudo to allow unprivileged users to perform this class of exploit.
Ubuntu USN Ubuntu USN USN-6018-1 Apport vulnerability
History

Fri, 07 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Canonical Apport Ubuntu Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: canonical

Published:

Updated: 2025-02-07T15:54:48.365Z

Reserved: 2023-03-10T16:17:04.430Z

Link: CVE-2023-1326

cve-icon Vulnrichment

Updated: 2024-08-02T05:40:59.987Z

cve-icon NVD

Status : Modified

Published: 2023-04-13T23:15:07.180

Modified: 2024-11-21T07:38:55.740

Link: CVE-2023-1326

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses