Lucene search

K
cvelistCanonicalCVELIST:CVE-2023-1326
HistoryApr 13, 2023 - 10:35 p.m.

CVE-2023-1326 local privilege escalation in apport-cli

2023-04-1322:35:19
CWE-269
canonical
www.cve.org
5
privilege escalation
apport-cli
local attacker
sudo
pager
terminal size
system administrator
cve-2023-26604

7.7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H

8.1 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.2%

A privilege escalation attack was found in apport-cli 2.26.0 and earlier which is similar to CVE-2023-26604. If a system is specially configured to allow unprivileged users to run sudo apport-cli, less is configured as the pager, and the terminal size can be set: a local attacker can escalate privilege. It is extremely unlikely that a system administrator would configure sudo to allow unprivileged users to perform this class of exploit.

CNA Affected

[
  {
    "collectionURL": "https://github.com/canonical/apport/tags",
    "packageName": "apport",
    "platforms": [
      "Linux"
    ],
    "product": "Apport",
    "repo": "https://github.com/canonical/apport/",
    "vendor": "Canonical Ltd.",
    "versions": [
      {
        "lessThanOrEqual": "2.26.0",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  }
]

7.7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H

8.1 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.2%