Svi
Pretraži prema proizvođaču
Pretraži prema CWE oznaci
O usluzi
Pretplate
Jezik
hr
en
CVE-2020-15396 - CERT CVE
CVE-2020-15396
ID
CVE-2020-15396
Sažetak
In HylaFAX+ through 7.0.2 and HylaFAX Enterprise, the faxsetup utility calls chown on files in user-owned directories. By winning a race, a local attacker could use this to escalate his privileges to root.
Reference
https://bugzilla.suse.com/show_bug.cgi?id=1173521
https://sourceforge.net/p/hylafax/HylaFAX+/2534/
https://security.gentoo.org/glsa/202007-06
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00054.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y46FOVJUS5SO44A2VEKR7DXEHTI4WK5L/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J52QFVREJWJ35YSEEDDRMZQ2LM2H2WE6/
CVSS
Base:
7.2
Impact:
10.0
Exploitability:
3.9
Pristup
Vektor
Složenost
Autentikacija
LOCAL
LOW
NONE
Impact
Povjerljivost
Cjelovitost
Dostupnost
COMPLETE
COMPLETE
COMPLETE
CVSS vektor
AV:L/AC:L/Au:N/C:C/I:C/A:C
Zadnje važnije ažuriranje
07-11-2023 - 03:17
Objavljeno
30-06-2020 - 12:15