CVE-2020-13696Incorrect Authorization in Xawtv

Severity
4.4MEDIUMNVD
EPSS
0.0%
top 86.75%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 8
Latest updateMay 24

Description

An issue was discovered in LinuxTV xawtv before 3.107. The function dev_open() in v4l-conf.c does not perform sufficient checks to prevent an unprivileged caller of the program from opening unintended filesystem paths. This allows a local attacker with access to the v4l-conf setuid-root program to test for the existence of arbitrary files and to trigger an open on arbitrary files with mode O_RDWR. To achieve this, relative path components need to be added to the device path, as demonstrated by a

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:NExploitability: 1.8 | Impact: 2.5

Affected Packages3 packages

NVDlinuxtv/xawtv< 3.107
NVDopensuse/leap15.1

Also affects: Debian Linux 8.0, Fedora 31, 32, Ubuntu Linux 16.04

Patches

🔴Vulnerability Details

4
GHSA
GHSA-v59g-m57m-jww7: An issue was discovered in LinuxTV xawtv before 32022-05-24
OSV
xawtv vulnerability2020-09-17
OSV
CVE-2020-13696: An issue was discovered in LinuxTV xawtv before 32020-06-08
CVEList
CVE-2020-13696: An issue was discovered in LinuxTV xawtv before 32020-06-08

📋Vendor Advisories

2
Ubuntu
xawtv vulnerability2020-09-17
Debian
CVE-2020-13696: xawtv - An issue was discovered in LinuxTV xawtv before 3.107. The function dev_open() i...2020

💬Community

3
Bugzilla
CVE-2020-13696 xawtv: specially crafted input leads to information disclosure and user privilege escalation2020-09-24
Bugzilla
CVE-2020-13696 xawtv: specially crafted input leads to information disclosure and user privilege escalation [fedora-all]2020-09-24
Bugzilla
CVE-2020-13696 xawtv: specially crafted input leads to information disclosure and user privilege escalation [epel-all]2020-09-24
CVE-2020-13696 — Incorrect Authorization in Xawtv | cvebase