CVE-2016-1579

EUVD-2016-2674
UDM provides support for running commands after a download is completed, this is currently made use of for click package installation. This functionality was not restricted to unconfined applications. Before UDM version 1.2+16.04.20160408-0ubuntu1 any confined application could make use of the UDM C++ API to run arbitrary commands in an unconfined environment as the phablet user.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.7 MEDIUM
LOCAL
HIGH
LOW
CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
canonicalCNA
6.7 MEDIUM
LOCAL
HIGH
LOW
CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 41%
Affected Products (NVD)
VendorProductVersion
canonicalubuntu_download_manager
-
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ubuntu-download-manager
artful
dne
bionic
dne
cosmic
dne
disco
dne
precise
dne
trusty
dne
wily
ignored
xenial
Fixed 1.2+16.04.20160408-0ubuntu1
released
yakkety
Fixed 1.2+16.04.20160408-0ubuntu1
released
zesty
Fixed 1.2+16.04.20160408-0ubuntu1
released
Common Weakness Enumeration