Vulnerabilities > Redhat > Automatic BUG Reporting Tool

DATE CVE VULNERABILITY TITLE RISK
2020-01-14 CVE-2015-3159 Unspecified vulnerability in Redhat Automatic BUG Reporting Tool
The abrt-action-install-debuginfo-to-abrt-cache help program in Automatic Bug Reporting Tool (ABRT) does not properly handle the process environment before invoking abrt-action-install-debuginfo, which allows local users to gain privileges.
local
low complexity
redhat
7.8
2020-01-14 CVE-2015-3151 Path Traversal vulnerability in Redhat Automatic BUG Reporting Tool
Directory traversal vulnerability in abrt-dbus in Automatic Bug Reporting Tool (ABRT) allows local users to read, write to, or change ownership of arbitrary files via unspecified vectors to the (1) NewProblem, (2) GetInfo, (3) SetElement, or (4) DeleteElement method.
local
low complexity
redhat CWE-22
7.8
2020-01-14 CVE-2015-3150 Improper Input Validation vulnerability in Redhat Automatic BUG Reporting Tool
abrt-dbus in Automatic Bug Reporting Tool (ABRT) allows local users to delete or change the ownership of arbitrary files via the problem directory argument to the (1) ChownProblemDir, (2) DeleteElement, or (3) DeleteProblem method.
local
low complexity
redhat CWE-20
7.1
2020-01-14 CVE-2015-3147 Link Following vulnerability in Redhat products
daemon/abrt-handle-upload.in in Automatic Bug Reporting Tool (ABRT), when moving problem reports from /var/spool/abrt-upload, allows local users to write to arbitrary files or possibly have other unspecified impact via a symlink attack on (1) /var/spool/abrt or (2) /var/tmp/abrt.
network
low complexity
redhat CWE-59
6.5
2020-01-14 CVE-2015-1869 Link Following vulnerability in Redhat Automatic BUG Reporting Tool
The default event handling scripts in Automatic Bug Reporting Tool (ABRT) allow local users to gain privileges as demonstrated by a symlink attack on a var_log_messages file.
local
low complexity
redhat CWE-59
7.8
2018-05-01 CVE-2013-4209 Information Exposure vulnerability in Redhat Automatic BUG Reporting Tool
Automatic Bug Reporting Tool (ABRT) before 2.1.6 allows local users to obtain sensitive information about arbitrary files via vectors related to sha1sums.
local
low complexity
redhat CWE-200
2.1
2017-06-26 CVE-2015-3315 Link Following vulnerability in Redhat Automatic BUG Reporting Tool
Automatic Bug Reporting Tool (ABRT) allows local users to read, change the ownership of, or have other unspecified impact on arbitrary files via a symlink attack on (1) /var/tmp/abrt/*/maps, (2) /tmp/jvm-*/hs_error.log, (3) /proc/*/exe, (4) /etc/os-release in a chroot, or (5) an unspecified root directory related to librpm.
local
low complexity
redhat CWE-59
7.2
2017-06-26 CVE-2015-3142 Information Exposure vulnerability in Redhat Automatic BUG Reporting Tool
The kernel-invoked coredump processor in Automatic Bug Reporting Tool (ABRT) does not properly check the ownership of files before writing core dumps to them, which allows local users to obtain sensitive information by leveraging write permissions to the working directory of a crashed application.
local
high complexity
redhat CWE-200
4.7
2017-06-26 CVE-2015-1870 Information Exposure vulnerability in Redhat Automatic BUG Reporting Tool
The event scripts in Automatic Bug Reporting Tool (ABRT) uses world-readable permission on a copy of sosreport file in problem directories, which allows local users to obtain sensitive information from /var/log/messages via unspecified vectors.
local
low complexity
redhat CWE-200
5.5
2015-12-07 CVE-2015-5287 Link Following vulnerability in Redhat products
The abrt-hook-ccpp help program in Automatic Bug Reporting Tool (ABRT) before 2.7.1 allows local users with certain permissions to gain privileges via a symlink attack on a file with a predictable name, as demonstrated by /var/tmp/abrt/abrt-hax-coredump or /var/spool/abrt/abrt-hax-coredump.
local
redhat CWE-59
6.9