CVE-2020-3812

qmail-verify as used in netqmail 1.06 is prone to an information disclosure vulnerability. A local attacker can test for the existence of files and directories anywhere in the filesystem because qmail-verify runs as root and tests for the existence of files in the attacker's home directory, without dropping its privileges first.
References
Link Resource
https://bugs.debian.org/961060 Issue Tracking Third Party Advisory
https://www.openwall.com/lists/oss-security/2020/05/19/8 Exploit Mailing List Patch Third Party Advisory
https://www.debian.org/security/2020/dsa-4692 Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/06/msg00002.html Mailing List Third Party Advisory
https://usn.ubuntu.com/4556-1/ Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:netqmail:netqmail:1.06:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*

Information

Published : 2020-05-26 06:15

Updated : 2022-04-28 12:30


NVD link : CVE-2020-3812

Mitre link : CVE-2020-3812


JSON object : View

CWE
CWE-269

Improper Privilege Management

Advertisement

dedicated server usa

Products Affected

debian

  • debian_linux

canonical

  • ubuntu_linux

netqmail

  • netqmail