CVE-2020-14342

It was found that cifs-utils' mount.cifs was invoking a shell when requesting the Samba password, which could be used to inject arbitrary commands. An attacker able to invoke mount.cifs with special permission, such as via sudo rules, could use this flaw to escalate their privileges.
Command Injection
OS Command Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.4 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
redhatCNA
4.4 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 31%
VendorProductVersion
sambacifs-utils
5.6 ≤
𝑥
≤ 6.10
opensuseleap
15.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
cifs-utils
bullseye
2:6.11-3.1+deb11u2
fixed
buster
no-dsa
stretch
no-dsa
bullseye (security)
2:6.11-3.1+deb11u1
fixed
bookworm
2:7.0-2
fixed
sid
2:7.0-2.1
fixed
trixie
2:7.0-2.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
cifs-utils
noble
Fixed 2:6.11-0ubuntu1
released
mantic
Fixed 2:6.11-0ubuntu1
released
lunar
Fixed 2:6.11-0ubuntu1
released
kinetic
Fixed 2:6.11-0ubuntu1
released
jammy
Fixed 2:6.11-0ubuntu1
released
impish
Fixed 2:6.11-0ubuntu1
released
hirsute
Fixed 2:6.11-0ubuntu1
released
groovy
Fixed 2:6.11-0ubuntu1
released
focal
Fixed 2:6.9-1ubuntu0.2
released
bionic
Fixed 2:6.8-1ubuntu1.2
released
xenial
needed
trusty
needed