Ubuntu 14.04 LTS / 16.04 LTS / 16.10 / 17.04 : apport vulnerability (USN-3354-1)

Medium Nessus Plugin ID 101809


The remote Ubuntu host is missing one or more security-related patches.


Felix Wilhelm discovered a path traversal vulnerability in Apport when handling the ExecutablePath field in crash files. An attacker could trick a user into opening a specially crafted crash file and execute arbitrary code with the user's privileges.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


Update the affected apport, python-apport and / or python3-apport packages.

Plugin Details

Severity: Medium

ID: 101809

File Name: ubuntu_USN-3354-1.nasl

Version: $Revision: 3.4 $

Type: local

Agent: unix

Published: 2017/07/19

Modified: 2018/01/30

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND


Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:canonical:ubuntu_linux:apport, p-cpe:/a:canonical:ubuntu_linux:python-apport, p-cpe:/a:canonical:ubuntu_linux:python3-apport, cpe:/o:canonical:ubuntu_linux:14.04, cpe:/o:canonical:ubuntu_linux:16.04, cpe:/o:canonical:ubuntu_linux:16.10, cpe:/o:canonical:ubuntu_linux:17.04

Required KB Items: Host/cpu, Host/Ubuntu, Host/Ubuntu/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2017/07/18

Reference Information

CVE: CVE-2017-10708

OSVDB: 161596

USN: 3354-1