CVE-2020-13696 — Incorrect Authorization in Xawtv
Severity
4.4MEDIUMNVD
EPSS
0.0%
top 86.75%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 8
Latest updateMay 24
Description
An issue was discovered in LinuxTV xawtv before 3.107. The function dev_open() in v4l-conf.c does not perform sufficient checks to prevent an unprivileged caller of the program from opening unintended filesystem paths. This allows a local attacker with access to the v4l-conf setuid-root program to test for the existence of arbitrary files and to trigger an open on arbitrary files with mode O_RDWR. To achieve this, relative path components need to be added to the device path, as demonstrated by a…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:NExploitability: 1.8 | Impact: 2.5
Affected Packages3 packages
Also affects: Debian Linux 8.0, Fedora 31, 32, Ubuntu Linux 16.04
Patches
🔴Vulnerability Details
4📋Vendor Advisories
2💬Community
3Bugzilla▶
CVE-2020-13696 xawtv: specially crafted input leads to information disclosure and user privilege escalation↗2020-09-24
Bugzilla▶
CVE-2020-13696 xawtv: specially crafted input leads to information disclosure and user privilege escalation [fedora-all]↗2020-09-24
Bugzilla▶
CVE-2020-13696 xawtv: specially crafted input leads to information disclosure and user privilege escalation [epel-all]↗2020-09-24