Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-13696

Опубликовано: 08 июн. 2020
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 3.6
CVSS3: 4.4

Описание

An issue was discovered in LinuxTV xawtv before 3.107. The function dev_open() in v4l-conf.c does not perform sufficient checks to prevent an unprivileged caller of the program from opening unintended filesystem paths. This allows a local attacker with access to the v4l-conf setuid-root program to test for the existence of arbitrary files and to trigger an open on arbitrary files with mode O_RDWR. To achieve this, relative path components need to be added to the device path, as demonstrated by a v4l-conf -c /dev/../root/.bash_history command.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

3.107-1
eoan

ignored

end of life
esm-apps/bionic

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

not-affected

3.107-1
esm-apps/noble

not-affected

3.107-1
esm-apps/xenial

released

3.103-3+deb8u1build0.16.04.1
esm-infra-legacy/trusty

DNE

focal

ignored

end of standard support, was needs-triage

Показывать по

EPSS

Процентиль: 13%
0.00044
Низкий

3.6 Low

CVSS2

4.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.4
nvd
больше 5 лет назад

An issue was discovered in LinuxTV xawtv before 3.107. The function dev_open() in v4l-conf.c does not perform sufficient checks to prevent an unprivileged caller of the program from opening unintended filesystem paths. This allows a local attacker with access to the v4l-conf setuid-root program to test for the existence of arbitrary files and to trigger an open on arbitrary files with mode O_RDWR. To achieve this, relative path components need to be added to the device path, as demonstrated by a v4l-conf -c /dev/../root/.bash_history command.

CVSS3: 4.4
debian
больше 5 лет назад

An issue was discovered in LinuxTV xawtv before 3.107. The function de ...

suse-cvrf
больше 5 лет назад

Security update for xawtv

suse-cvrf
больше 5 лет назад

Security update for xawtv

CVSS3: 4.4
github
больше 3 лет назад

An issue was discovered in LinuxTV xawtv before 3.107. The function dev_open() in v4l-conf.c does not perform sufficient checks to prevent an unprivileged caller of the program from opening unintended filesystem paths. This allows a local attacker with access to the v4l-conf setuid-root program to test for the existence of arbitrary files and to trigger an open on arbitrary files with mode O_RDWR. To achieve this, relative path components need to be added to the device path, as demonstrated by a v4l-conf -c /dev/../root/.bash_history command.

EPSS

Процентиль: 13%
0.00044
Низкий

3.6 Low

CVSS2

4.4 Medium

CVSS3