Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-7040

Опубликовано: 21 янв. 2020
Источник: debian
EPSS Низкий

Описание

storeBackup.pl in storeBackup through 3.5 relies on the /tmp/storeBackup.lock pathname, which allows symlink attacks that possibly lead to privilege escalation. (Local users can also create a plain file named /tmp/storeBackup.lock to block use of storeBackup until an admin manually deletes that file.)

Пакеты

ПакетСтатусВерсия исправленияРелизТип
storebackupfixed3.2.1-2package
storebackupfixed3.2.1-2~deb10u1busterpackage
storebackupfixed3.2.1-2~deb9u1stretchpackage

Примечания

  • https://bugzilla.suse.com/show_bug.cgi?id=1156767

  • https://www.openwall.com/lists/oss-security/2020/01/20/3

  • SuSE provided patch: https://www.openwall.com/lists/oss-security/2020/01/20/3/1

EPSS

Процентиль: 90%
0.05192
Низкий

Связанные уязвимости

CVSS3: 8.1
ubuntu
около 6 лет назад

storeBackup.pl in storeBackup through 3.5 relies on the /tmp/storeBackup.lock pathname, which allows symlink attacks that possibly lead to privilege escalation. (Local users can also create a plain file named /tmp/storeBackup.lock to block use of storeBackup until an admin manually deletes that file.)

CVSS3: 8.1
nvd
около 6 лет назад

storeBackup.pl in storeBackup through 3.5 relies on the /tmp/storeBackup.lock pathname, which allows symlink attacks that possibly lead to privilege escalation. (Local users can also create a plain file named /tmp/storeBackup.lock to block use of storeBackup until an admin manually deletes that file.)

suse-cvrf
около 6 лет назад

Security update for storeBackup

CVSS3: 8.1
github
больше 3 лет назад

storeBackup.pl in storeBackup through 3.5 relies on the /tmp/storeBackup.lock pathname, which allows symlink attacks that possibly lead to privilege escalation. (Local users can also create a plain file named /tmp/storeBackup.lock to block use of storeBackup until an admin manually deletes that file.)

EPSS

Процентиль: 90%
0.05192
Низкий