Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-28374
HistoryJan 12, 2021 - 12:00 a.m.

CVE-2020-28374

2021-01-1200:00:00
ubuntu.com
ubuntu.com
32

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

5.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:P/A:N

0.003 Low

EPSS

Percentile

65.7%

In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7,
insufficient identifier checking in the LIO SCSI target code can be used by
remote attackers to read or write files via directory traversal in an XCOPY
request, aka CID-2896c93811e3. For example, an attack can occur over a
network if the attacker has access to one iSCSI LUN. The attacker gains
control over file access because I/O operations are proxied via an
attacker-selected backstore.

Notes

Author Note
sbeattie MITIGATION XCOPY support is enabled by default, but can be disabled via: echo 0 > /sys/kernel/config/target/core/<backstore>/<name>/attrib/emulate_3pc or targetcli /backstores/<backstore>/<name> set attribute emulate_3pc=0 . This workaround does not affect XCOPY requests sent to tcmu-runner based backstores.
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchlinux< 4.15.0-132.136UNKNOWN
ubuntu20.04noarchlinux< 5.4.0-62.70UNKNOWN
ubuntu20.10noarchlinux< 5.8.0-38.43UNKNOWN
ubuntu14.04noarchlinux< 3.13.0-184.235) Available with Ubuntu Pro or Ubuntu Pro (Infra-onlyUNKNOWN
ubuntu16.04noarchlinux< 4.4.0-200.232UNKNOWN
ubuntu18.04noarchlinux-aws< 4.15.0-1093.99UNKNOWN
ubuntu20.04noarchlinux-aws< 5.4.0-1037.39UNKNOWN
ubuntu20.10noarchlinux-aws< 5.8.0-1020.22UNKNOWN
ubuntu14.04noarchlinux-aws< 4.4.0-1085.89) Available with Ubuntu Pro or Ubuntu Pro (Infra-onlyUNKNOWN
ubuntu16.04noarchlinux-aws< 4.4.0-1121.135UNKNOWN
Rows per page:
1-10 of 551

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

5.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:P/A:N

0.003 Low

EPSS

Percentile

65.7%