Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-4042

Опубликовано: 10 июл. 2020
Источник: debian
EPSS Низкий

Описание

Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to the director itself leading to the director responding to the replayed challenge. The response obtained is then a valid reply to the directors original challenge. This is fixed in version 19.2.8.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
bareosremovedpackage
bareosignoredbusterpackage
bareosno-dsastretchpackage

Примечания

  • https://github.com/bareos/bareos/security/advisories/GHSA-vqpj-2vhj-h752

  • https://bugs.bareos.org/view.php?id=1250

  • https://github.com/bareos/bareos/commit/93f2db6451a684fbb224a7d24cdd85e77b2b51fc (master)

  • Workaround: Make sure the director will not connect to a client that can

  • initiate connections. As a rule: every client with "Connection From Client

  • To Director = yes" must also set "Connection From Director To Client = no".

EPSS

Процентиль: 50%
0.00267
Низкий

Связанные уязвимости

CVSS3: 6.8
ubuntu
больше 5 лет назад

Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to the director itself leading to the director responding to the replayed challenge. The response obtained is then a valid reply to the directors original challenge. This is fixed in version 19.2.8.

CVSS3: 6.8
nvd
больше 5 лет назад

Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to the director itself leading to the director responding to the replayed challenge. The response obtained is then a valid reply to the directors original challenge. This is fixed in version 19.2.8.

EPSS

Процентиль: 50%
0.00267
Низкий