Описание
In HylaFAX+ through 7.0.2 and HylaFAX Enterprise, the faxsetup utility calls chown on files in user-owned directories. By winning a race, a local attacker could use this to escalate his privileges to root.
In HylaFAX+ through 7.0.2 and HylaFAX Enterprise, the faxsetup utility calls chown on files in user-owned directories. By winning a race, a local attacker could use this to escalate his privileges to root.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2020-15396
- https://bugzilla.suse.com/show_bug.cgi?id=1173521
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J52QFVREJWJ35YSEEDDRMZQ2LM2H2WE6
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y46FOVJUS5SO44A2VEKR7DXEHTI4WK5L
- https://security.gentoo.org/glsa/202007-06
- https://sourceforge.net/p/hylafax/HylaFAX+/2534
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00039.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00040.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00046.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00054.html
Связанные уязвимости
In HylaFAX+ through 7.0.2 and HylaFAX Enterprise, the faxsetup utility calls chown on files in user-owned directories. By winning a race, a local attacker could use this to escalate his privileges to root.
In HylaFAX+ through 7.0.2 and HylaFAX Enterprise, the faxsetup utility calls chown on files in user-owned directories. By winning a race, a local attacker could use this to escalate his privileges to root.
In HylaFAX+ through 7.0.2 and HylaFAX Enterprise, the faxsetup utility ...