Lucene search

K
cveCanonicalCVE-2020-27348
HistoryDec 04, 2020 - 3:15 a.m.

CVE-2020-27348

2020-12-0403:15:12
CWE-427
canonical
web.nvd.nist.gov
78
6
cve-2020-27348
snapcraft
ld_library_path
code execution
security vulnerability
nvd

CVSS2

4.4

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

CVSS3

6.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L

EPSS

0.001

Percentile

38.8%

In some conditions, a snap package built by snapcraft includes the current directory in LD_LIBRARY_PATH, allowing a malicious snap to gain code execution within the context of another snap if both plug the home interface or similar. This issue affects snapcraft versions prior to 4.4.4, prior to 2.43.1+16.04.1, and prior to 2.43.1+18.04.1.

Affected configurations

Nvd
Node
canonicalsnapcraftRange<4.4.4
Node
canonicalubuntu_linuxMatch16.04
OR
canonicalubuntu_linuxMatch18.04
VendorProductVersionCPE
canonicalsnapcraft*cpe:2.3:a:canonical:snapcraft:*:*:*:*:*:*:*:*
canonicalubuntu_linux16.04cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:*:*:*:*
canonicalubuntu_linux18.04cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "snapcraft",
    "vendor": "Canonical",
    "versions": [
      {
        "lessThan": "4.4.4",
        "status": "affected",
        "version": "4.4",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "2.43.1+18.04.1",
            "status": "unaffected"
          }
        ],
        "lessThan": "2.43.1+16.04.1",
        "status": "affected",
        "version": "2.43.1",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

CVSS2

4.4

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

CVSS3

6.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L

EPSS

0.001

Percentile

38.8%