Ubuntu update for amanda



Risk Low
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2022-37703
CVE-2022-37704
CVE-2022-37705
CWE-ID CWE-668
CWE-264
Exploitation vector Local
Public exploit N/A
Vulnerable software
Ubuntu
Operating systems & Components / Operating system

amanda-client (Ubuntu package)
Operating systems & Components / Operating system package or component

Vendor Canonical Ltd.

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Exposure of Resource to Wrong Sphere

EUVDB-ID: #VU74334

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-37703

CWE-ID: CWE-668 - Exposure of resource to wrong sphere

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to the calcsize SUID binary can return information on any file on the filesystem. A local user can detect whether the file is present on the system.

Mitigation

Update the affected package amanda to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 22.10

amanda-client (Ubuntu package): before 1:3.5.1-1ubuntu0.3

CPE2.3 External links

https://ubuntu.com/security/notices/USN-5966-3


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU74335

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-37704

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application is using a setuid binary /lib/amanda/rundump to process backup files. A local user can inject arbitrary arguments to the command and execute arbitrary commands as root.

Mitigation

Update the affected package amanda to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 22.10

amanda-client (Ubuntu package): before 1:3.5.1-1ubuntu0.3

CPE2.3 External links

https://ubuntu.com/security/notices/USN-5966-3


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU74336

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-37705

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application is using a setuid component runtar, which is a wrapper for /usr/bin/tar with specific arguments that are controllable by the attacker. A local user can execute arbitrary code with root privileges.

Mitigation

Update the affected package amanda to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 22.10

amanda-client (Ubuntu package): before 1:3.5.1-1ubuntu0.3

CPE2.3 External links

https://ubuntu.com/security/notices/USN-5966-3


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###