| |
Vulnerability CVE-2020-8013
Published: 2020-03-02
Description: |
A UNIX Symbolic Link (Symlink) Following vulnerability in chkstat of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15, SUSE Linux Enterprise Server 11 set permissions intended for specific binaries on other binaries because it erroneously followed symlinks. The symlinks can't be controlled by attackers on default systems, so exploitation is difficult. This issue affects: SUSE Linux Enterprise Server 12 permissions versions prior to 2015.09.28.1626-17.27.1. SUSE Linux Enterprise Server 15 permissions versions prior to 20181116-9.23.1. SUSE Linux Enterprise Server 11 permissions versions prior to 2013.1.7-0.6.12.1. |
Type:
CWE-59 (Improper Link Resolution Before File Access ('Link Following'))
CVSS2 => (AV:L/AC:M/Au:N/C:N/I:P/A:N)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
1.9/10 |
2.9/10 |
3.4/10 |
Exploit range |
Attack complexity |
Authentication |
Local |
Medium |
No required |
Confidentiality impact |
Integrity impact |
Availability impact |
None |
Partial |
None |
References: |
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00010.html
https://bugzilla.suse.com/show_bug.cgi?id=1163922
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|