Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-15397

Опубликовано: 30 июн. 2020
Источник: debian

Описание

HylaFAX+ through 7.0.2 and HylaFAX Enterprise have scripts that execute binaries from directories writable by unprivileged users (e.g., locations under /var/spool/hylafax that are writable by the uucp account). This allows these users to execute code in the context of the user calling these binaries (often root).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
hylafaxnot-affectedpackage

Примечания

  • https://sourceforge.net/p/hylafax/HylaFAX+/2534/

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 5 лет назад

HylaFAX+ through 7.0.2 and HylaFAX Enterprise have scripts that execute binaries from directories writable by unprivileged users (e.g., locations under /var/spool/hylafax that are writable by the uucp account). This allows these users to execute code in the context of the user calling these binaries (often root).

CVSS3: 7.8
nvd
больше 5 лет назад

HylaFAX+ through 7.0.2 and HylaFAX Enterprise have scripts that execute binaries from directories writable by unprivileged users (e.g., locations under /var/spool/hylafax that are writable by the uucp account). This allows these users to execute code in the context of the user calling these binaries (often root).

CVSS3: 7.8
github
больше 3 лет назад

HylaFAX+ through 7.0.2 and HylaFAX Enterprise have scripts that execute binaries from directories writable by unprivileged users (e.g., locations under /var/spool/hylafax that are writable by the uucp account). This allows these users to execute code in the context of the user calling these binaries (often root).

suse-cvrf
больше 5 лет назад

Security update for hylafax+

suse-cvrf
больше 5 лет назад

Security update for hylafax+