Lucene search

K
cve[email protected]CVE-2020-15704
HistorySep 01, 2020 - 12:15 a.m.

CVE-2020-15704

2020-09-0100:15:09
CWE-20
CWE-200
web.nvd.nist.gov
149
cve-2020-15704
modprobe
debian
patch
vulnerability
exploitation
security fix
nvd

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

5.2 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

16.1%

The modprobe child process in the ./debian/patches/load_ppp_generic_if_needed patch file incorrectly handled module loading. A local non-root attacker could exploit the MODPROBE_OPTIONS environment variable to read arbitrary root files. Fixed in 2.4.5-5ubuntu1.4, 2.4.5-5.1ubuntu2.3+esm2, 2.4.7-1+2ubuntu1.16.04.3, 2.4.7-2+2ubuntu1.3, 2.4.7-2+4.1ubuntu5.1, 2.4.7-2+4.1ubuntu6. Was ZDI-CAN-11504.

Affected configurations

NVD
Node
canonicalpppRange<2.4.7-1\+ubuntu1.16.04.3
AND
canonicalubuntu_linuxMatch16.04lts
Node
canonicalpppRange<2.4.7-2\+2ubuntu1.3
AND
canonicalubuntu_linuxMatch18.04lts
Node
canonicalpppRange<2.4.7-2\+4.1ubuntu5.1
AND
canonicalubuntu_linuxMatch20.04lts
Node
canonicalpppRange<2.4.5-5ubuntu1.4
AND
canonicalubuntu_linuxMatch12.04esm
Node
canonicalpppRange<2.4.5-5.1ubuntu2.3\+esm2
AND
canonicalubuntu_linuxMatch14.04esm

CNA Affected

[
  {
    "product": "ppp",
    "vendor": "Canonical",
    "versions": [
      {
        "changes": [
          {
            "at": "2.4.5-5.1ubuntu2.3+esm2",
            "status": "unaffected"
          }
        ],
        "lessThan": "2.4.5-5ubuntu1.4",
        "status": "affected",
        "version": "2.4.5",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "2.4.7-2+2ubuntu1.3",
            "status": "unaffected"
          },
          {
            "at": "2.4.7-2+4.1ubuntu5.1",
            "status": "unaffected"
          },
          {
            "at": "2.4.7-2+4.1ubuntu6",
            "status": "unaffected"
          }
        ],
        "lessThan": "2.4.7-1+2ubuntu1.16.04.3",
        "status": "affected",
        "version": "2.4.7",
        "versionType": "custom"
      }
    ]
  }
]

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

5.2 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

16.1%