TROYANOSYVIRUS
Volver a CVEs

CVE-2020-15397

HIGH
7.8

Descripcion

HylaFAX+ through 7.0.2 and HylaFAX Enterprise have scripts that execute binaries from directories writable by unprivileged users (e.g., locations under /var/spool/hylafax that are writable by the uucp account). This allows these users to execute code in the context of the user calling these binaries (often root).

Detalles CVE

Puntuacion CVSS v3.17.8
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado6/30/2020
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0

Productos afectados

hylafax\+_project:hylafax\+ifax:hylafax_enterprise

Debilidades (CWE)

CWE-732

Referencias

https://bugzilla.suse.com/show_bug.cgi?id=1173519(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202007-06(af854a3a-2127-422b-91ae-364da2661108)
https://sourceforge.net/p/hylafax/HylaFAX+/2534/(af854a3a-2127-422b-91ae-364da2661108)

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.