Логотип exploitDog
bind:CVE-2020-13696
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-13696

Количество 7

Количество 7

ubuntu логотип

CVE-2020-13696

больше 5 лет назад

An issue was discovered in LinuxTV xawtv before 3.107. The function dev_open() in v4l-conf.c does not perform sufficient checks to prevent an unprivileged caller of the program from opening unintended filesystem paths. This allows a local attacker with access to the v4l-conf setuid-root program to test for the existence of arbitrary files and to trigger an open on arbitrary files with mode O_RDWR. To achieve this, relative path components need to be added to the device path, as demonstrated by a v4l-conf -c /dev/../root/.bash_history command.

CVSS3: 4.4
EPSS: Низкий
nvd логотип

CVE-2020-13696

больше 5 лет назад

An issue was discovered in LinuxTV xawtv before 3.107. The function dev_open() in v4l-conf.c does not perform sufficient checks to prevent an unprivileged caller of the program from opening unintended filesystem paths. This allows a local attacker with access to the v4l-conf setuid-root program to test for the existence of arbitrary files and to trigger an open on arbitrary files with mode O_RDWR. To achieve this, relative path components need to be added to the device path, as demonstrated by a v4l-conf -c /dev/../root/.bash_history command.

CVSS3: 4.4
EPSS: Низкий
debian логотип

CVE-2020-13696

больше 5 лет назад

An issue was discovered in LinuxTV xawtv before 3.107. The function de ...

CVSS3: 4.4
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:0784-1

больше 5 лет назад

Security update for xawtv

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1712-1

больше 5 лет назад

Security update for xawtv

EPSS: Низкий
github логотип

GHSA-v59g-m57m-jww7

больше 3 лет назад

An issue was discovered in LinuxTV xawtv before 3.107. The function dev_open() in v4l-conf.c does not perform sufficient checks to prevent an unprivileged caller of the program from opening unintended filesystem paths. This allows a local attacker with access to the v4l-conf setuid-root program to test for the existence of arbitrary files and to trigger an open on arbitrary files with mode O_RDWR. To achieve this, relative path components need to be added to the device path, as demonstrated by a v4l-conf -c /dev/../root/.bash_history command.

CVSS3: 4.4
EPSS: Низкий
fstec логотип

BDU:2020-03475

больше 5 лет назад

Уязвимость функции dev_open() программного пакета для просмотра телевизионных программ на PC LinuxTV Xawtv, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 4.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-13696

An issue was discovered in LinuxTV xawtv before 3.107. The function dev_open() in v4l-conf.c does not perform sufficient checks to prevent an unprivileged caller of the program from opening unintended filesystem paths. This allows a local attacker with access to the v4l-conf setuid-root program to test for the existence of arbitrary files and to trigger an open on arbitrary files with mode O_RDWR. To achieve this, relative path components need to be added to the device path, as demonstrated by a v4l-conf -c /dev/../root/.bash_history command.

CVSS3: 4.4
0%
Низкий
больше 5 лет назад
nvd логотип
CVE-2020-13696

An issue was discovered in LinuxTV xawtv before 3.107. The function dev_open() in v4l-conf.c does not perform sufficient checks to prevent an unprivileged caller of the program from opening unintended filesystem paths. This allows a local attacker with access to the v4l-conf setuid-root program to test for the existence of arbitrary files and to trigger an open on arbitrary files with mode O_RDWR. To achieve this, relative path components need to be added to the device path, as demonstrated by a v4l-conf -c /dev/../root/.bash_history command.

CVSS3: 4.4
0%
Низкий
больше 5 лет назад
debian логотип
CVE-2020-13696

An issue was discovered in LinuxTV xawtv before 3.107. The function de ...

CVSS3: 4.4
0%
Низкий
больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:0784-1

Security update for xawtv

0%
Низкий
больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1712-1

Security update for xawtv

0%
Низкий
больше 5 лет назад
github логотип
GHSA-v59g-m57m-jww7

An issue was discovered in LinuxTV xawtv before 3.107. The function dev_open() in v4l-conf.c does not perform sufficient checks to prevent an unprivileged caller of the program from opening unintended filesystem paths. This allows a local attacker with access to the v4l-conf setuid-root program to test for the existence of arbitrary files and to trigger an open on arbitrary files with mode O_RDWR. To achieve this, relative path components need to be added to the device path, as demonstrated by a v4l-conf -c /dev/../root/.bash_history command.

CVSS3: 4.4
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-03475

Уязвимость функции dev_open() программного пакета для просмотра телевизионных программ на PC LinuxTV Xawtv, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 4.4
0%
Низкий
больше 5 лет назад

Уязвимостей на страницу