It was found that cifs-utils' mount.cifs was invoking a shell when requesting the Samba password, which could be used to inject arbitrary commands. An attacker able to invoke mount.cifs with special permission, such as via sudo rules, could use this flaw to escalate their privileges.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00109.html | Mailing List Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14342 | Issue Tracking Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DUMRICFXJVCBBOSKZSKT3HFVQM6VPJU3/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBNFSTJOQWVPFZAUJNNMAPY45PW5RTTE/ | |
https://lists.samba.org/archive/samba-technical/2020-September/135747.html | Exploit Mailing List Vendor Advisory |
https://security.gentoo.org/glsa/202009-16 | Third Party Advisory |
Configurations
History
07 Nov 2023, 03:17
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2020-09-09 12:15
Updated : 2024-02-28 17:47
NVD link : CVE-2020-14342
Mitre link : CVE-2020-14342
CVE.ORG link : CVE-2020-14342
JSON object : View
Products Affected
samba
- cifs-utils
opensuse
- leap
fedoraproject
- fedora