CVE-2020-15396

In HylaFAX+ through 7.0.2 and HylaFAX Enterprise, the faxsetup utility calls chown on files in user-owned directories. By winning a race, a local attacker could use this to escalate his privileges to root.
Configurations

Configuration 1 (hide)

cpe:2.3:a:hylafax\+_project:hylafax\+:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:ifax:hylafax_enterprise:-:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
cpe:2.3:a:opensuse:backports_sle:15.0:sp2:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*

History

28 Apr 2022, 18:57

Type Values Removed Values Added
CWE CWE-269 CWE-362
CPE cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
cpe:2.3:a:opensuse:backports_sle:15.0:sp2:*:*:*:*:*:*
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y46FOVJUS5SO44A2VEKR7DXEHTI4WK5L/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y46FOVJUS5SO44A2VEKR7DXEHTI4WK5L/ - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00039.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00039.html - Mailing List, Third Party Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J52QFVREJWJ35YSEEDDRMZQ2LM2H2WE6/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J52QFVREJWJ35YSEEDDRMZQ2LM2H2WE6/ - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00040.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00040.html - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00054.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00054.html - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00046.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00046.html - Mailing List, Third Party Advisory
References (GENTOO) https://security.gentoo.org/glsa/202007-06 - (GENTOO) https://security.gentoo.org/glsa/202007-06 - Third Party Advisory

Information

Published : 2020-06-30 12:15

Updated : 2024-02-04 21:00


NVD link : CVE-2020-15396

Mitre link : CVE-2020-15396

CVE.ORG link : CVE-2020-15396


JSON object : View

Products Affected

opensuse

  • backports_sle
  • leap

hylafax\+_project

  • hylafax\+

fedoraproject

  • fedora

ifax

  • hylafax_enterprise
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')