In HylaFAX+ through 7.0.2 and HylaFAX Enterprise, the faxsetup utility calls chown on files in user-owned directories. By winning a race, a local attacker could use this to escalate his privileges to root.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00039.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00040.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00046.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00054.html | Mailing List Third Party Advisory |
https://bugzilla.suse.com/show_bug.cgi?id=1173521 | Exploit Issue Tracking Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J52QFVREJWJ35YSEEDDRMZQ2LM2H2WE6/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y46FOVJUS5SO44A2VEKR7DXEHTI4WK5L/ | |
https://security.gentoo.org/glsa/202007-06 | Third Party Advisory |
https://sourceforge.net/p/hylafax/HylaFAX+/2534/ | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
07 Nov 2023, 03:17
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2020-06-30 12:15
Updated : 2024-02-28 17:47
NVD link : CVE-2020-15396
Mitre link : CVE-2020-15396
CVE.ORG link : CVE-2020-15396
JSON object : View
Products Affected
hylafax\+_project
- hylafax\+
ifax
- hylafax_enterprise
fedoraproject
- fedora
opensuse
- backports_sle
- leap
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')