NA

CVE-2022-37705

Published: 16/04/2023 Updated: 03/12/2023
CVSS v3 Base Score: 6.7 | Impact Score: 5.9 | Exploitability Score: 0.8
VMScore: 0

Vulnerability Summary

A privilege escalation flaw was found in Amanda 3.5.1 in which the backup user can acquire root privileges. The vulnerable component is the runtar SUID program, which is a wrapper to run /usr/bin/tar with specific arguments that are controllable by the attacker. This program mishandles the arguments passed to tar binary (it expects that the argument name and value are separated with a space; however, separating them with an equals sign is also supported),

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

zmanda amanda 3.5.1

Vendor Advisories

Debian Bug report logs - #1029829 amanda: CVE-2022-37704 CVE-2022-37705 Package: src:amanda; Maintainer for src:amanda is Jose M Calhariz <calhariz@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 28 Jan 2023 13:03:01 UTC Severity: grave Tags: security, upstream Found in version amanda/1 ...
Debian Bug report logs - #1055253 amanda: CVE-2023-30577 Package: src:amanda; Maintainer for src:amanda is Jose M Calhariz <calhariz@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 2 Nov 2023 20:54:02 UTC Severity: grave Tags: security, upstream Found in versions amanda/1:351-11, ama ...
Description<!----> This CVE is under investigation by Red Hat Product Security ...

Github Repositories

Amanda 3.5.1 second LPE.

[Suggested description] A privilege escalation flaw was found on Amanda 351 that can take backup user to root privileges The vulnerable component is the runtar SUID that is just a wrapper to run /usr/bin/tar with specific arguments that are controllable by the attacker The program does not check correctly the args passed to tar binary (it assumes that all args should be lik