First published: Tue Jun 30 2020(Updated: )
In HylaFAX+ through 7.0.2 and HylaFAX Enterprise, the faxsetup utility calls chown on files in user-owned directories. By winning a race, a local attacker could use this to escalate his privileges to root.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
HylaFAX+ | <=7.0.2 | |
Hylafax | ||
Fedora | =31 | |
Fedora | =32 | |
openSUSE Backports | =15.0-sp1 | |
openSUSE Backports | =15.0-sp2 | |
openSUSE | =15.1 | |
openSUSE | =15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15396 has been classified with a medium severity level.
To fix CVE-2020-15396, ensure that you upgrade to the version of HylaFAX+ greater than 7.0.2 or apply any relevant patches provided by your distribution.
CVE-2020-15396 affects users of HylaFAX+ versions up to and including 7.0.2 and various versions of HylaFAX Enterprise, as well as specific Fedora and openSUSE distributions.
An attacker can escalate their privileges to root by exploiting a race condition in the faxsetup utility.
CVE-2020-15396 is a local vulnerability that requires access to the affected system to exploit.