qmail-verify as used in netqmail 1.06 is prone to an information disclosure vulnerability. A local attacker can test for the existence of files and directories anywhere in the filesystem because qmail-verify runs as root and tests for the existence of files in the attacker's home directory, without dropping its privileges first.
References
Link | Resource |
---|---|
https://bugs.debian.org/961060 | Issue Tracking Third Party Advisory |
https://www.openwall.com/lists/oss-security/2020/05/19/8 | Exploit Mailing List Patch Third Party Advisory |
https://www.debian.org/security/2020/dsa-4692 | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/06/msg00002.html | Mailing List Third Party Advisory |
https://usn.ubuntu.com/4556-1/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2020-05-26 06:15
Updated : 2022-04-28 12:30
NVD link : CVE-2020-3812
Mitre link : CVE-2020-3812
JSON object : View
CWE
CWE-269
Improper Privilege Management
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
netqmail
- netqmail