7.2
CVSSv2

CVE-2020-15396

Published: 30/06/2020 Updated: 07/11/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

In HylaFAX+ up to and including 7.0.2 and HylaFAX Enterprise, the faxsetup utility calls chown on files in user-owned directories. By winning a race, a local attacker could use this to escalate his privileges to root.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

hylafax\\+ project hylafax\\+

ifax hylafax enterprise -

fedoraproject fedora 31

fedoraproject fedora 32

opensuse leap 15.1

opensuse backports sle 15.0

opensuse leap 15.2

Vendor Advisories

Debian Bug report logs - #964198 CVE-2020-15397 CVE-2020-15396 Package: src:hylafax; Maintainer for src:hylafax is Giuseppe Sacco <eppesuig@debianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Fri, 3 Jul 2020 14:00:02 UTC Severity: important Tags: security, upstream Found in version hylafax/3:607-3 ...
In HylaFAX+ through 702 and HylaFAX Enterprise, the faxsetup utility calls chown on files in user-owned directories By winning a race, a local attacker could use this to escalate his privileges to root ...