CVE-2014-5220Command Injection in Project Mdadm

Severity
7.8HIGHNVD
EPSS
0.2%
top 63.40%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 8
Latest updateMay 14

Description

The mdcheck script of the mdadm package for openSUSE 13.2 prior to version 3.3.1-5.14.1 does not properly sanitize device names, which allows local attackers to execute arbitrary commands as root.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

debiandebian/mdadm< mdadm 3.3.4-1 (bookworm)
NVDmdadm_project/mdadm< 3.3.3
Debianmdadm_project/mdadm< 3.3.4-1+3

🔴Vulnerability Details

2
GHSA
GHSA-m32j-rvq2-jpp7: The mdcheck script of the mdadm package for openSUSE 132022-05-14
OSV
CVE-2014-5220: The mdcheck script of the mdadm package for openSUSE 132018-06-08

📋Vendor Advisories

2
Red Hat
mdadm: Improper sanitization of device names allows arbitrary command execution2014-12-17
Debian
CVE-2014-5220: mdadm - The mdcheck script of the mdadm package for openSUSE 13.2 prior to version 3.3.1...2014

💬Community

1
Bugzilla
CVE-2014-5220 mdadm: Improper sanitization of device names allows arbitrary command execution2018-06-11
CVE-2014-5220 — Command Injection in Project Mdadm | cvebase