An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads the CrashDB field and it then evaluates the field as Python code if it begins with a "{". This allows remote attackers to execute arbitrary Python code.
2016-12-17T03:59:00.297
2025-04-12T10:46:40.837
Deferred
CVSSv3.0: 7.8 (HIGH)
AV:N/AC:M/Au:N/C:C/I:C/A:C
8.6
10.0
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | apport_project | apport | ≤ 2.20.3 | Yes |
| Operating System | canonical | ubuntu_linux | ≤ 12.10 | Yes |