CVE-2020-15702

CVSS V2 Medium 4.4 CVSS V3 High 7
Description
TOCTOU Race Condition vulnerability in apport allows a local attacker to escalate privileges and execute arbitrary code. An attacker may exit the crashed process and exploit PID recycling to spawn a root process with the same PID as the crashed process, which can then be used to escalate privileges. Fixed in 2.20.1-0ubuntu2.24, 2.20.9 versions prior to 2.20.9-0ubuntu7.16 and 2.20.11 versions prior to 2.20.11-0ubuntu27.6. Was ZDI-CAN-11234.
Overview
  • CVE ID
  • CVE-2020-15702
  • Assigner
  • security@ubuntu.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2020-08-06T23:15:11
  • Last Modified Date
  • 2023-01-27T18:19:56
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu16:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu17:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu18:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu19:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu20:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu21:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu22:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu23:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu24:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu25:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu26:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:* 0 OR
AND
cpe:2.3:a:canonical:apport:2.20.7-0ubuntu3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.7-0ubuntu3.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.7-0ubuntu4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.8-0ubuntu1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.8-0ubuntu2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.8-0ubuntu3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.8-0ubuntu4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.8-0ubuntu5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.8-0ubuntu6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.8-0ubuntu7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.8-0ubuntu8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.8-0ubuntu9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.8-0ubuntu10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.9-0ubuntu1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.9-0ubuntu2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.9-0ubuntu3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.9-0ubuntu4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.9-0ubuntu5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.9-0ubuntu6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.15:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* 0 OR
AND
cpe:2.3:a:canonical:apport:2.19.1-0ubuntu3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.19.2-0ubuntu1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.19.2-0ubuntu2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.19.2-0ubuntu3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.19.2-0ubuntu4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.19.2-0ubuntu5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.19.2-0ubuntu6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.19.2-0ubuntu7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.19.2-0ubuntu8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.19.2-0ubuntu9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.19.3-0ubuntu1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.19.3-0ubuntu2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.19.3-0ubuntu3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.19.4-0ubuntu1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.19.4-0ubuntu2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20-0ubuntu1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20-0ubuntu2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20-0ubuntu3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.1-0ubuntu1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.16:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.17:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.18:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.19:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.20:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.21:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.22:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.23:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* 0 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:L/AC:M/Au:N/C:P/I:P/A:P
  • Access Vector
  • LOCAL
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 4.4
  • Severity
  • MEDIUM
  • Exploitability Score
  • 3.4
  • Impact Score
  • 6.4
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • LOCAL
  • Attack Compatibility
  • HIGH
  • Privileges Required
  • LOW
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 7
  • Base Severity
  • HIGH
  • Exploitability Score
  • 1
  • Impact Score
  • 5.9
References
Reference URL Reference Tags
https://usn.ubuntu.com/4449-1 Vendor Advisory
https://usn.ubuntu.com/4449-1/ Vendor Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-979/ Third Party Advisory VDB Entry
https://usn.ubuntu.com/4449-2/
History
Created Old Value New Value Data Type Notes
2022-05-10 16:24:26 Added to TrackCVE
2022-12-04 20:39:20 2020-08-06T23:15Z 2020-08-06T23:15:11 CVE Published Date updated
2022-12-04 20:39:20 2020-09-14T16:15:11 CVE Modified Date updated
2022-12-04 20:39:20 Undergoing Analysis Vulnerability Status updated
2023-01-27 19:10:22 2023-01-27T18:19:56 CVE Modified Date updated
2023-01-27 19:10:22 Undergoing Analysis Analyzed Vulnerability Status updated