CVE-2020-15703
Publication date 24 September 2020
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
There is no input validation on the Locale property in an apt transaction. An unprivileged user can supply a full path to a writable directory, which lets aptd read a file as root. Having a symlink in place results in an error message if the file exists, and no error otherwise. This way an unprivileged user can check for the existence of any files on the system as root.
Status
Package | Ubuntu Release | Status |
---|---|---|
aptdaemon | 20.04 LTS focal |
Fixed 1.1.1+bzr982-0ubuntu32.2
|
18.04 LTS bionic |
Fixed 1.1.1+bzr982-0ubuntu19.4
|
|
16.04 LTS xenial |
Fixed 1.1.1+bzr982-0ubuntu14.4
|
|
14.04 LTS trusty | Not in release |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.5 · Medium |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-4537-1
- Aptdaemon vulnerability
- 24 September 2020