It was found that cifs-utils' mount.cifs was invoking a shell when requesting the Samba password, which could be used to inject arbitrary commands. An attacker able to invoke mount.cifs with special permission, such as via sudo rules, could use this flaw to escalate their privileges.
References
Link | Resource |
---|---|
https://lists.samba.org/archive/samba-technical/2020-September/135747.html | Exploit Mailing List Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14342 | Issue Tracking Patch Third Party Advisory |
https://security.gentoo.org/glsa/202009-16 | Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00109.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JBNFSTJOQWVPFZAUJNNMAPY45PW5RTTE/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DUMRICFXJVCBBOSKZSKT3HFVQM6VPJU3/ | Mailing List Third Party Advisory |
Information
Published : 2020-09-09 05:15
Updated : 2022-11-16 07:09
NVD link : CVE-2020-14342
Mitre link : CVE-2020-14342
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
samba
- cifs-utils
fedoraproject
- fedora
opensuse
- leap