Vulnerability Name: | CVE-2014-5220 (CCN-150162) | ||||||||||||||||||||||||||||||||
Assigned: | 2014-12-17 | ||||||||||||||||||||||||||||||||
Published: | 2014-12-17 | ||||||||||||||||||||||||||||||||
Updated: | 2019-07-16 | ||||||||||||||||||||||||||||||||
Summary: | The mdcheck script of the mdadm package for openSUSE 13.2 prior to version 3.3.1-5.14.1 does not properly sanitize device names, which allows local attackers to execute arbitrary commands as root. | ||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.3 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-77 | ||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2014-5220 Source: CCN Type: Bugzilla Bug 910500 VUL-0: CVE-2014-5220: mdadm: mdcheck doesn't validate the input of mdadm --detail --export, possible command injection Source: CONFIRM Type: Issue Tracking, Vendor Advisory https://bugzilla.suse.com/show_bug.cgi?id=910500 Source: XF Type: UNKNOWN opensuse-cve20145220-cmd-exec(150162) Source: SUSE Type: Mailing List, Vendor Advisory openSUSE-SU-2015:0308 Source: CCN Type: openSUSE Web site The makers' choice for sysadmins, developers and desktop users. | ||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
BACK |