In HylaFAX+ through 7.0.2 and HylaFAX Enterprise, the faxsetup utility calls chown on files in user-owned directories. By winning a race, a local attacker could use this to escalate his privileges to root.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00039.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00040.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00046.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00054.html | Mailing List Third Party Advisory |
https://bugzilla.suse.com/show_bug.cgi?id=1173521 | Exploit Issue Tracking Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J52QFVREJWJ35YSEEDDRMZQ2LM2H2WE6/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y46FOVJUS5SO44A2VEKR7DXEHTI4WK5L/ | |
https://security.gentoo.org/glsa/202007-06 | Third Party Advisory |
https://sourceforge.net/p/hylafax/HylaFAX+/2534/ | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
28 Apr 2022, 18:57
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-362 | |
CPE | cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:* cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:* cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:* cpe:2.3:a:opensuse:backports_sle:15.0:sp2:*:*:*:*:*:* |
|
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y46FOVJUS5SO44A2VEKR7DXEHTI4WK5L/ - Mailing List, Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00039.html - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J52QFVREJWJ35YSEEDDRMZQ2LM2H2WE6/ - Mailing List, Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00040.html - Mailing List, Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00054.html - Mailing List, Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00046.html - Mailing List, Third Party Advisory | |
References | (GENTOO) https://security.gentoo.org/glsa/202007-06 - Third Party Advisory |
Information
Published : 2020-06-30 12:15
Updated : 2024-02-04 21:00
NVD link : CVE-2020-15396
Mitre link : CVE-2020-15396
CVE.ORG link : CVE-2020-15396
JSON object : View
Products Affected
opensuse
- backports_sle
- leap
hylafax\+_project
- hylafax\+
fedoraproject
- fedora
ifax
- hylafax_enterprise
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')