CVE-2015-3151
Summary
| CVE | CVE-2015-3151 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-01-14 18:15:00 UTC |
| Updated | 2023-02-13 00:47:00 UTC |
| Description | Directory traversal vulnerability in abrt-dbus in Automatic Bug Reporting Tool (ABRT) allows local users to read, write to, or change ownership of arbitrary files via unspecified vectors to the (1) NewProblem, (2) GetInfo, (3) SetElement, or (4) DeleteElement method. |
Risk And Classification
Problem Types: CWE-22
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Redhat | Automatic Bug Reporting Tool | - | All | All | All |
| Application | Redhat | Automatic Bug Reporting Tool | - | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| dbus: report invalid element names · abrt/abrt@f3c2a6a · GitHub | CONFIRM | github.com | Patch, Third Party Advisory |
| 1214451 – (CVE-2015-3151) CVE-2015-3151 abrt: directory traversals in several D-Bus methods implemented by abrt-dbus | MISC | bugzilla.redhat.com | |
| lib: add a function checking file names · abrt/libreport@54ecf8d · GitHub | CONFIRM | github.com | Patch, Third Party Advisory |
| daemon: use libreport's function checking file name · abrt/abrt@c796c76 · GitHub | CONFIRM | github.com | Patch, Third Party Advisory |
| 1214451 – (CVE-2015-3151) CVE-2015-3151 abrt: directory traversals in several D-Bus methods implemented by abrt-dbus | MISC | bugzilla.redhat.com | Issue Tracking, Third Party Advisory |
| Red Hat Customer Portal | MISC | access.redhat.com | |
| access.redhat.com | CVE-2015-3151 | MISC | access.redhat.com | |
| dd: harden functions against directory traversal issues · abrt/libreport@239c4f7 · GitHub | CONFIRM | github.com | Patch, Third Party Advisory |
| dbus: validate parameters of all calls · abrt/abrt@7a47f57 · GitHub | CONFIRM | github.com | Patch, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.