Lucene search

K
vulnrichmentCanonicalVULNRICHMENT:CVE-2021-3899
HistoryJun 03, 2024 - 6:40 p.m.

CVE-2021-3899

2024-06-0318:40:32
canonical
github.com
2
vulnerability
race condition
arbitrary code execution
root access

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

There is a race condition in the ‘replaced executable’ detection that, with the correct local configuration, allow an attacker to execute arbitrary code as root.

CNA Affected

[
  {
    "packageName": "apport",
    "product": "Apport",
    "vendor": "Canonical Ltd.",
    "repo": "https://github.com/canonical/apport",
    "platforms": [
      "Linux"
    ],
    "versions": [
      {
        "lessThan": "2.21.0",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  }
]

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:apport:apport:*:*:*:*:*:*:*:*"
    ],
    "vendor": "apport",
    "product": "apport",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "2.21.0",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unknown"
  }
]

SSVC

Exploitation

none

Automatable

no

Technical Impact

total