CVE-2021-3709

high-risk
Published 2021-10-01

Function check_attachment_for_errors() in file data/general-hooks/ubuntu.py could be tricked into exposing private data via a constructed crash file. This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8; 2.20.1 versions prior to 2.20.1-0ubuntu2.30+esm2; 2.20.9 versions prior to 2.20.9-0ubuntu7.26; 2.20.11 versions prior to 2.20.11-0ubuntu27.20; 2.20.11 versions prior to 2.20.11-0ubuntu65.3;

Do I need to act?

-
0.07% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.5/10 Medium
LOCAL / LOW complexity

Affected Products (20)

Apport
Apport
Apport
Apport
Apport
Apport
Apport
Apport
Apport
Apport
Apport
Apport
Apport
Apport
Apport
Apport
Apport
Apport
Apport
Apport

Affected Vendors

54
/ 100
high-risk
Severity 21/34 · High
Exploitability 0/34 · Minimal
Exposure 33/34 · Critical