Lucene search

K
cveCanonicalCVE-2020-15704
HistorySep 01, 2020 - 12:15 a.m.

CVE-2020-15704

2020-09-0100:15:09
CWE-200
CWE-20
canonical
web.nvd.nist.gov
159
cve-2020-15704
modprobe
debian
patch
vulnerability
exploitation
security fix
nvd

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

5.2

Confidence

High

EPSS

0.001

Percentile

28.9%

The modprobe child process in the ./debian/patches/load_ppp_generic_if_needed patch file incorrectly handled module loading. A local non-root attacker could exploit the MODPROBE_OPTIONS environment variable to read arbitrary root files. Fixed in 2.4.5-5ubuntu1.4, 2.4.5-5.1ubuntu2.3+esm2, 2.4.7-1+2ubuntu1.16.04.3, 2.4.7-2+2ubuntu1.3, 2.4.7-2+4.1ubuntu5.1, 2.4.7-2+4.1ubuntu6. Was ZDI-CAN-11504.

Affected configurations

Nvd
Node
canonicalpppRange<2.4.7-1\+ubuntu1.16.04.3
AND
canonicalubuntu_linuxMatch16.04lts
Node
canonicalpppRange<2.4.7-2\+2ubuntu1.3
AND
canonicalubuntu_linuxMatch18.04lts
Node
canonicalpppRange<2.4.7-2\+4.1ubuntu5.1
AND
canonicalubuntu_linuxMatch20.04lts
Node
canonicalpppRange<2.4.5-5ubuntu1.4
AND
canonicalubuntu_linuxMatch12.04esm
Node
canonicalpppRange<2.4.5-5.1ubuntu2.3\+esm2
AND
canonicalubuntu_linuxMatch14.04esm
VendorProductVersionCPE
canonicalppp*cpe:2.3:a:canonical:ppp:*:*:*:*:*:*:*:*
canonicalubuntu_linux16.04cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
canonicalubuntu_linux18.04cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
canonicalubuntu_linux20.04cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
canonicalubuntu_linux12.04cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
canonicalubuntu_linux14.04cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*

CNA Affected

[
  {
    "product": "ppp",
    "vendor": "Canonical",
    "versions": [
      {
        "changes": [
          {
            "at": "2.4.5-5.1ubuntu2.3+esm2",
            "status": "unaffected"
          }
        ],
        "lessThan": "2.4.5-5ubuntu1.4",
        "status": "affected",
        "version": "2.4.5",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "2.4.7-2+2ubuntu1.3",
            "status": "unaffected"
          },
          {
            "at": "2.4.7-2+4.1ubuntu5.1",
            "status": "unaffected"
          },
          {
            "at": "2.4.7-2+4.1ubuntu6",
            "status": "unaffected"
          }
        ],
        "lessThan": "2.4.7-1+2ubuntu1.16.04.3",
        "status": "affected",
        "version": "2.4.7",
        "versionType": "custom"
      }
    ]
  }
]

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

5.2

Confidence

High

EPSS

0.001

Percentile

28.9%