CVE-2020-15396

In HylaFAX+ through 7.0.2 and HylaFAX Enterprise, the faxsetup utility calls chown on files in user-owned directories. By winning a race, a local attacker could use this to escalate his privileges to root.
Configurations

Configuration 1 (hide)

cpe:2.3:a:hylafax\+_project:hylafax\+:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:ifax:hylafax_enterprise:-:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
cpe:2.3:a:opensuse:backports_sle:15.0:sp2:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*

History

07 Nov 2023, 03:17

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J52QFVREJWJ35YSEEDDRMZQ2LM2H2WE6/', 'name': 'FEDORA-2020-01eb48bcce', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y46FOVJUS5SO44A2VEKR7DXEHTI4WK5L/', 'name': 'FEDORA-2020-8aa8793d25', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J52QFVREJWJ35YSEEDDRMZQ2LM2H2WE6/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y46FOVJUS5SO44A2VEKR7DXEHTI4WK5L/ -

Information

Published : 2020-06-30 12:15

Updated : 2024-02-28 17:47


NVD link : CVE-2020-15396

Mitre link : CVE-2020-15396

CVE.ORG link : CVE-2020-15396


JSON object : View

Products Affected

hylafax\+_project

  • hylafax\+

ifax

  • hylafax_enterprise

fedoraproject

  • fedora

opensuse

  • backports_sle
  • leap
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')