CVE-2016-1587

Publication date 27 October 2016

Last updated 25 August 2025


Ubuntu priority

Cvss 3 Severity Score

7.5 · High

Score breakdown

Description

The Snapweb interface before version 0.21.2 was exposing controls to install or remove snap packages without controlling the identity of the user, nor the origin of the connection. An attacker could have used the controls to remotely add a valid, but malicious, snap package, from the Store, potentially using system resources without permission from the legitimate administrator of the system.

Read the notes from the security team

Status

Package Ubuntu Release Status
snapweb 16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
12.04 LTS precise Not in release

Notes


tyhicks

snapweb is delivered as a snap and is not built as a deb in the Ubuntu archive

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
snapweb

Severity score breakdown

Parameter Value
Base score 7.5 · High
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Access our resources on patching vulnerabilities