CVE-2015-8768
📋 TL;DR
CVE-2015-8768 is a critical vulnerability in click/install.py that allows attackers to bypass security restrictions when installing packages. By crafting malicious package tarballs without requiring files to start with './', attackers can install alternate security policies and gain elevated privileges. This primarily affects Ubuntu Phone systems using the click package manager.
💻 Affected Systems
- click package manager
📦 What is this software?
Click by Click Project
Ubuntu Linux by Canonical
Ubuntu Linux by Canonical
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with root privileges, allowing complete control over the affected device and potential lateral movement in connected networks.
Likely Case
Privilege escalation leading to unauthorized access to sensitive data, installation of backdoors, or disruption of device functionality.
If Mitigated
Limited impact with proper package source validation and restricted installation permissions in place.
🎯 Exploit Status
Demonstrated with test.mmrow app for Ubuntu phone. Requires user to install a malicious package.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed in click package updates (Ubuntu USN-2771-1)
Vendor Advisory: http://ubuntu.com/usn/usn-2771-1
Restart Required: No
Instructions:
1. Update click package via apt-get update && apt-get upgrade click. 2. Verify installation with dpkg -l click. 3. Ensure no malicious packages are installed.
🔧 Temporary Workarounds
Restrict package installation sources
linuxOnly install packages from trusted repositories and verified sources
Implement package validation
linuxAdd validation to ensure package files start with './' before installation
🧯 If You Can't Patch
- Disable click package manager functionality if not required
- Implement strict app installation policies and user education about untrusted packages
🔍 How to Verify
Check if Vulnerable:
Check click package version: dpkg -l | grep click. If version is prior to fix, system is vulnerable.
Check Version:
dpkg -l | grep click
Verify Fix Applied:
Verify click package is updated to patched version and test installation of known safe packages.
📡 Detection & Monitoring
Log Indicators:
- Unusual package installation events
- Click installation failures or warnings
- Security policy modification attempts
Network Indicators:
- Downloads from untrusted repositories
- Unusual package sources
SIEM Query:
source="click" AND (event="install" OR event="policy_change") AND status="failure"
🔗 References
- http://bazaar.launchpad.net/~click-hackers/click/devel/revision/587
- http://ubuntu.com/usn/usn-2771-1
- http://www.openwall.com/lists/oss-security/2016/01/12/8
- http://www.securityfocus.com/bid/96386
- https://bugs.launchpad.net/ubuntu/+source/click/+bug/1506467
- https://code.launchpad.net/~cjwatson/click/audit-missing-dot-slash/+merge/274554
- https://insights.ubuntu.com/2015/10/15/update-on-ubuntu-phone-security-issue/
- https://plus.google.com/+SzymonWaliczek/posts/3jbG2uiAniF
- http://bazaar.launchpad.net/~click-hackers/click/devel/revision/587
- http://ubuntu.com/usn/usn-2771-1
- http://www.openwall.com/lists/oss-security/2016/01/12/8
- http://www.securityfocus.com/bid/96386
- https://bugs.launchpad.net/ubuntu/+source/click/+bug/1506467
- https://code.launchpad.net/~cjwatson/click/audit-missing-dot-slash/+merge/274554
- https://insights.ubuntu.com/2015/10/15/update-on-ubuntu-phone-security-issue/
- https://plus.google.com/+SzymonWaliczek/posts/3jbG2uiAniF