Bug 1214451 (CVE-2015-3151)

Summary: CVE-2015-3151 abrt: directory traversals in several D-Bus methods implemented by abrt-dbus
Product: [Other] Security Response Reporter: Florian Weimer <fweimer>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: abrt-devel-list, dvlasenk, iprikryl, jfilak, jrusnack, mhabrnal, michal.toman, mmilata
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Multiple directory traversal flaws were found in the abrt-dbus D-Bus service. A local attacker could use these flaws to read and write arbitrary files as the root user.
Story Points: ---
Clone Of: Environment:
Last Closed: 2015-07-09 05:35:11 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1214452, 1214453, 1214454, 1218235    
Bug Blocks: 1211224, 1214172    

Description Florian Weimer 2015-04-22 18:11:37 UTC
It was discovered that the abrt-dbus D-Bus service contains several
directory traversal flaws related to the NewProblem, GetInfo and
SetElement methods.  Local attackers could use these flaws to read and
write arbitrary files as the root user, or take ownership of arbitrary
files and directories.

Acknowledgements:

This issue was discovered by Florian Weimer of Red Hat Product Security.

Comment 3 Florian Weimer 2015-04-22 18:15:34 UTC
Created abrt tracking bugs for this issue:

Affects: fedora-all [bug 1214452]

Comment 5 Jakub Filak 2015-05-15 08:43:05 UTC
Martin has found out that DeleteElement method is still vulnerable. This upstream commit adds additional verification of all D-Bus parameters:
https://github.com/abrt/abrt/commit/7a47f57975be0d285a2f20758e4572dca6d9cdd3

Comment 6 errata-xmlrpc 2015-06-09 19:49:12 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2015:1083 https://rhn.redhat.com/errata/RHSA-2015-1083.html