CVE-2020-21583

An issue was discovered in hwclock.13-v2.27 allows attackers to gain escalated privlidges or execute arbitrary commands via the path parameter when setting the date.
References
Link Resource
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786804 Exploit Mailing List Patch Third Party Advisory
https://packetstormsecurity.com/files/132061/hwclock-Privilege-Escalation.html Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*

History

28 Aug 2023, 16:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.7
First Time Kernel
Kernel util-linux
CPE cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*
References (MISC) https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786804 - (MISC) https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786804 - Exploit, Mailing List, Patch, Third Party Advisory
References (MISC) https://packetstormsecurity.com/files/132061/hwclock-Privilege-Escalation.html - (MISC) https://packetstormsecurity.com/files/132061/hwclock-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry
CWE NVD-CWE-noinfo

22 Aug 2023, 20:10

Type Values Removed Values Added
New CVE

Information

Published : 2023-08-22 19:16

Updated : 2023-12-10 15:14


NVD link : CVE-2020-21583

Mitre link : CVE-2020-21583

CVE.ORG link : CVE-2020-21583


JSON object : View

Products Affected

kernel

  • util-linux