CVE-2020-15396

In HylaFAX+ through 7.0.2 and HylaFAX Enterprise, the faxsetup utility calls chown on files in user-owned directories. By winning a race, a local attacker could use this to escalate his privileges to root.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00039.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00040.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00046.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00054.html Mailing List Third Party Advisory
https://bugzilla.suse.com/show_bug.cgi?id=1173521 Exploit Issue Tracking Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J52QFVREJWJ35YSEEDDRMZQ2LM2H2WE6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y46FOVJUS5SO44A2VEKR7DXEHTI4WK5L/
https://security.gentoo.org/glsa/202007-06 Third Party Advisory
https://sourceforge.net/p/hylafax/HylaFAX+/2534/ Patch Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00039.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00040.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00046.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00054.html Mailing List Third Party Advisory
https://bugzilla.suse.com/show_bug.cgi?id=1173521 Exploit Issue Tracking Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J52QFVREJWJ35YSEEDDRMZQ2LM2H2WE6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y46FOVJUS5SO44A2VEKR7DXEHTI4WK5L/
https://security.gentoo.org/glsa/202007-06 Third Party Advisory
https://sourceforge.net/p/hylafax/HylaFAX+/2534/ Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:hylafax\+_project:hylafax\+:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:ifax:hylafax_enterprise:-:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
cpe:2.3:a:opensuse:backports_sle:15.0:sp2:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-06-30 12:15

Updated : 2024-11-21 05:05


NVD link : CVE-2020-15396

Mitre link : CVE-2020-15396

CVE.ORG link : CVE-2020-15396


JSON object : View

Products Affected

opensuse

  • backports_sle
  • leap

fedoraproject

  • fedora

hylafax\+_project

  • hylafax\+

ifax

  • hylafax_enterprise
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')