Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-11061

Опубликовано: 10 июл. 2020
Источник: debian

Описание

In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director's memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs mitigates the problem. This issue is also patched in Bareos versions 19.2.8, 18.2.9 and 17.2.10.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
baculafixed9.6.5-1package
baculafixed9.4.2-2+deb10u1busterpackage
bareosremovedpackage
bareosno-dsabusterpackage
bareosno-dsastretchpackage

Примечания

  • https://github.com/bareos/bareos/security/advisories/GHSA-mm45-cg35-54j4

  • https://bugs.bareos.org/view.php?id=1210

  • https://github.com/bareos/bareos/commit/86c6fa479a21a1464366babb74e6cf33770ed7ae (master)

  • https://www.bacula.org/git/cgit.cgi/bacula/commit/?id=f9472227317b8e1d26a781d042e0efdf432a633f (Release-9.6.4)

Связанные уязвимости

CVSS3: 6
ubuntu
больше 5 лет назад

In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director's memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs mitigates the problem. This issue is also patched in Bareos versions 19.2.8, 18.2.9 and 17.2.10.

CVSS3: 6
nvd
больше 5 лет назад

In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director's memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs mitigates the problem. This issue is also patched in Bareos versions 19.2.8, 18.2.9 and 17.2.10.