Unrated severityNVD Advisory· Published Sep 9, 2020· Updated Aug 4, 2024
CVE-2020-14342
CVE-2020-14342
Description
It was found that cifs-utils' mount.cifs was invoking a shell when requesting the Samba password, which could be used to inject arbitrary commands. An attacker able to invoke mount.cifs with special permission, such as via sudo rules, could use this flaw to escalate their privileges.
Affected products
13- osv-coords12 versionspkg:rpm/opensuse/cifs-utils&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/cifs-utils&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/cifs-utils&distro=openSUSE%20Tumbleweedpkg:rpm/suse/cifs-utils&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/cifs-utils&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/cifs-utils&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP1pkg:rpm/suse/cifs-utils&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP2pkg:rpm/suse/cifs-utils&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/cifs-utils&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/cifs-utils&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/cifs-utils&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/cifs-utils&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5
< 6.9-lp151.4.7.1+ 11 more
- (no CPE)range: < 6.9-lp151.4.7.1
- (no CPE)range: < 6.9-lp152.2.3.1
- (no CPE)range: < 6.13-1.3
- (no CPE)range: < 6.9-3.14.1
- (no CPE)range: < 6.9-3.14.1
- (no CPE)range: < 6.9-5.6.1
- (no CPE)range: < 6.9-5.6.1
- (no CPE)range: < 6.9-13.11.1
- (no CPE)range: < 6.9-3.14.1
- (no CPE)range: < 6.9-13.11.1
- (no CPE)range: < 6.9-3.14.1
- (no CPE)range: < 6.9-13.11.1
- samba/cifs-utilsv5Range: 6.11
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- lists.opensuse.org/opensuse-security-announce/2020-09/msg00109.htmlmitrevendor-advisoryx_refsource_SUSE
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DUMRICFXJVCBBOSKZSKT3HFVQM6VPJU3/mitrevendor-advisoryx_refsource_FEDORA
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBNFSTJOQWVPFZAUJNNMAPY45PW5RTTE/mitrevendor-advisoryx_refsource_FEDORA
- security.gentoo.org/glsa/202009-16mitrevendor-advisoryx_refsource_GENTOO
- bugzilla.redhat.com/show_bug.cgimitrex_refsource_CONFIRM
- lists.samba.org/archive/samba-technical/2020-September/135747.htmlmitrex_refsource_MISC
News mentions
0No linked articles in our index yet.