CVE-2020-14342

EUVD-2020-6487
It was found that cifs-utils' mount.cifs was invoking a shell when requesting the Samba password, which could be used to inject arbitrary commands. An attacker able to invoke mount.cifs with special permission, such as via sudo rules, could use this flaw to escalate their privileges.
Command Injection
OS Command Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
4.4 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
redhatCNA
4.4 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 33%
Affected Products (NVD)
VendorProductVersion
sambacifs-utils
5.6 ≤
𝑥
≤ 6.10
opensuseleap
15.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
cifs-utils
bookworm
2:7.0-2
fixed
bullseye
2:6.11-3.1+deb11u2
fixed
bullseye (security)
2:6.11-3.1+deb11u1
fixed
buster
no-dsa
sid
2:7.0-2.1
fixed
stretch
no-dsa
trixie
2:7.0-2.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
cifs-utils
bionic
Fixed 2:6.8-1ubuntu1.2
released
focal
Fixed 2:6.9-1ubuntu0.2
released
groovy
Fixed 2:6.11-0ubuntu1
released
hirsute
Fixed 2:6.11-0ubuntu1
released
impish
Fixed 2:6.11-0ubuntu1
released
jammy
Fixed 2:6.11-0ubuntu1
released
kinetic
Fixed 2:6.11-0ubuntu1
released
lunar
Fixed 2:6.11-0ubuntu1
released
mantic
Fixed 2:6.11-0ubuntu1
released
noble
Fixed 2:6.11-0ubuntu1
released
trusty
needed
xenial
needed