An issue was discovered in hwclock.13-v2.27 allows attackers to gain escalated privlidges or execute arbitrary commands via the path parameter when setting the date.
References
Link | Resource |
---|---|
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786804 | Exploit Mailing List Patch Third Party Advisory |
https://packetstormsecurity.com/files/132061/hwclock-Privilege-Escalation.html | Exploit Third Party Advisory VDB Entry |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786804 | Exploit Mailing List Patch Third Party Advisory |
https://packetstormsecurity.com/files/132061/hwclock-Privilege-Escalation.html | Exploit Third Party Advisory VDB Entry |
https://security.netapp.com/advisory/ntap-20241220-0006/ |
Configurations
History
20 Dec 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2023-08-22 19:16
Updated : 2024-12-20 13:15
NVD link : CVE-2020-21583
Mitre link : CVE-2020-21583
CVE.ORG link : CVE-2020-21583
JSON object : View
Products Affected
kernel
- util-linux
CWE
NVD-CWE-noinfo
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')