CVE-2021-3899 NVD security document
Reporter | Title | Published | Views | Family All 14 |
---|---|---|---|---|
![]() | CVE-2021-3899 | 17 May 202200:00 | – | ubuntucve |
![]() | Arbitrary Code Execution | 18 May 202218:29 | – | veracode |
![]() | CVE-2021-3899 | 3 Jun 202418:40 | – | cvelist |
![]() | CVE-2021-3899 | 3 Jun 202419:15 | – | nvd |
![]() | CVE-2021-3899 | 3 Jun 202418:40 | – | vulnrichment |
![]() | Exploit for CVE-2021-3899 | 21 May 202201:52 | – | githubexploit |
![]() | Ubuntu 18.04 LTS / 20.04 LTS / 22.04 LTS : Apport vulnerabilities (USN-5427-1) | 17 May 202200:00 | – | nessus |
![]() | Ubuntu 16.04 LTS : Apport vulnerabilities (USN-6894-1) | 12 Jul 202400:00 | – | nessus |
![]() | Ubuntu: Security Advisory (USN-6894-1) | 12 Jul 202400:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-5427-1) | 18 May 202200:00 | – | openvas |
[
{
"packageName": "apport",
"product": "Apport",
"vendor": "Canonical Ltd.",
"repo": "https://github.com/canonical/apport",
"platforms": [
"Linux"
],
"versions": [
{
"lessThan": "2.21.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
]
Parameter | Position | Path | Description | CWE |
---|---|---|---|---|
ALL ALL=(root) NOPASSWD: /usr/bin/ping | request body | /etc/sudoers | Configuration allowing users to run ping as root without password, leading to potential local privilege escalation via Apport. | CWE-367 |
logrotate | request body | /etc/logrotate.conf | Logrotate configuration that is exploited to trigger a reverse shell process. | CWE-367 |
core | request body | /etc/logrotate.d/core | Core dump file location where the unauthorized access occurs after the exploitable race condition. | CWE-367 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo