An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads the CrashDB field and it then evaluates the field as Python code if it begins with a "{". This allows remote attackers to execute arbitrary Python code.
https://github.com/DonnchaC/ubuntu-apport-exploitation
http://www.securityfocus.com/bid/95011
https://www.exploit-db.com/exploits/40937/
https://bugs.launchpad.net/apport/+bug/1648806
http://www.ubuntu.com/usn/USN-3157-1
Source: Mitre, NVD
Published: 2016-12-17
Updated: 2025-04-12
Base Score: 9.3
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
Severity: High
Base Score: 7.8
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS: 0.16283