Amanda 3.5.1 allows privilege escalation from the regular user backup to root. The SUID binary located at /lib/amanda/rundump will execute /usr/sbin/dump as root with controlled arguments from the attacker which may lead to escalation of privileges, denial of service, and information disclosure.
                
            References
                    Configurations
                    History
                    21 Nov 2024, 07:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.amanda.org/ - Product | |
| References | () https://github.com/MaherAzzouzi/CVE-2022-37704 - Third Party Advisory | |
| References | () https://github.com/zmanda/amanda/issues/192 - | |
| References | () https://github.com/zmanda/amanda/pull/197 - Patch | |
| References | () https://github.com/zmanda/amanda/pull/205 - Patch | |
| References | () https://github.com/zmanda/amanda/releases/tag/tag-community-3.5.3 - | |
| References | () https://lists.debian.org/debian-lts-announce/2023/02/msg00025.html - | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5DCLSX5YYTWMKSMDL67M5STZ5ZDSOXK/ - | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ATMGMVS3QDN6OMKMHGUTUTU7NS7HR3BZ/ - | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JYREA6LFXF5M7K4WLNJV5VNQPS4MTBW2/ - | |
| References | () https://marc.info/?l=amanda-hackers - | 
07 Nov 2023, 03:49
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
 | 
06 Jun 2023, 18:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
30 May 2023, 12:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
28 Apr 2023, 18:24
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 6.7 | 
26 Apr 2023, 13:06
| Type | Values Removed | Values Added | 
|---|---|---|
| References | (MISC) https://github.com/zmanda/amanda/pull/197 - Patch | |
| References | (MISC) https://github.com/MaherAzzouzi/CVE-2022-37704 - Third Party Advisory | |
| References | (MISC) http://www.amanda.org/ - Product | |
| References | (MISC) https://github.com/zmanda/amanda/pull/205 - Patch | |
| CPE | cpe:2.3:a:zmanda:amanda:3.5.1:*:*:*:*:*:*:* | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 7.8 | 
| First Time | Zmanda Zmanda amanda | |
| CWE | CWE-77 | 
16 Apr 2023, 01:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-04-16 01:15
Updated : 2025-02-06 18:15
NVD link : CVE-2022-37704
Mitre link : CVE-2022-37704
CVE.ORG link : CVE-2022-37704
JSON object : View
Products Affected
                zmanda
- amanda
CWE
                
                    
                        
                        CWE-77
                        
            Improper Neutralization of Special Elements used in a Command ('Command Injection')
