UBUNTU-CVE-2020-14342

See a problem?
Source
https://ubuntu.com/security/notices/UBUNTU-CVE-2020-14342
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-14342.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2020-14342
Related
Published
2020-09-09T12:15:00Z
Modified
2020-09-09T12:15:00Z
Severity
  • 7.0 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

It was found that cifs-utils' mount.cifs was invoking a shell when requesting the Samba password, which could be used to inject arbitrary commands. An attacker able to invoke mount.cifs with special permission, such as via sudo rules, could use this flaw to escalate their privileges.

References

Affected packages

Ubuntu:Pro:14.04:LTS / cifs-utils

Package

Name
cifs-utils

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:6.*

2:6.0-1ubuntu2

Ecosystem specific

{
    "ubuntu_priority": "low"
}

Ubuntu:Pro:16.04:LTS / cifs-utils

Package

Name
cifs-utils

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:6.*

2:6.4-1ubuntu1
2:6.4-1ubuntu1.1

Ecosystem specific

{
    "ubuntu_priority": "low"
}

Ubuntu:18.04:LTS / cifs-utils

Package

Name
cifs-utils
Purl
pkg:deb/ubuntu/cifs-utils@2:6.8-1ubuntu1.2?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:6.8-1ubuntu1.2

Affected versions

2:6.*

2:6.7-1
2:6.8-1
2:6.8-1ubuntu1
2:6.8-1ubuntu1.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "cifs-utils": "2:6.8-1ubuntu1.2",
            "cifs-utils-dbgsym": "2:6.8-1ubuntu1.2"
        }
    ]
}

Ubuntu:20.04:LTS / cifs-utils

Package

Name
cifs-utils
Purl
pkg:deb/ubuntu/cifs-utils@2:6.9-1ubuntu0.2?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:6.9-1ubuntu0.2

Affected versions

2:6.*

2:6.9-0ubuntu1
2:6.9-1
2:6.9-1ubuntu0.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "cifs-utils": "2:6.9-1ubuntu0.2",
            "cifs-utils-dbgsym": "2:6.9-1ubuntu0.2"
        }
    ]
}