DEBIAN-CVE-2020-14342

Source
https://security-tracker.debian.org/tracker/CVE-2020-14342
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2020-14342.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2020-14342
Upstream
Published
2020-09-09T12:15:11Z
Modified
2025-09-25T22:40:48Z
Severity
  • 7.0 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

It was found that cifs-utils' mount.cifs was invoking a shell when requesting the Samba password, which could be used to inject arbitrary commands. An attacker able to invoke mount.cifs with special permission, such as via sudo rules, could use this flaw to escalate their privileges.

References

Affected packages

Debian:11 / cifs-utils

Package

Name
cifs-utils
Purl
pkg:deb/debian/cifs-utils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:6.11-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / cifs-utils

Package

Name
cifs-utils
Purl
pkg:deb/debian/cifs-utils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:6.11-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / cifs-utils

Package

Name
cifs-utils
Purl
pkg:deb/debian/cifs-utils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:6.11-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / cifs-utils

Package

Name
cifs-utils
Purl
pkg:deb/debian/cifs-utils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:6.11-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}