It was found that cifs-utils' mount.cifs was invoking a shell when requesting the Samba password, which could be used to inject arbitrary commands. An attacker able to invoke mount.cifs with special permission, such as via sudo rules, could use this flaw to escalate their privileges.
References
Link | Resource |
---|---|
https://lists.samba.org/archive/samba-technical/2020-September/135747.html | Exploit Mailing List Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14342 | Issue Tracking Patch Third Party Advisory |
https://security.gentoo.org/glsa/202009-16 | Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00109.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DUMRICFXJVCBBOSKZSKT3HFVQM6VPJU3/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBNFSTJOQWVPFZAUJNNMAPY45PW5RTTE/ |
Configurations
History
07 Nov 2023, 03:17
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2020-09-09 12:15
Updated : 2023-11-07 03:17
NVD link : CVE-2020-14342
Mitre link : CVE-2020-14342
JSON object : View
Products Affected
opensuse
- leap
samba
- cifs-utils
fedoraproject
- fedora
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')