Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-13882

Опубликовано: 18 июн. 2020
Источник: ubuntu
Приоритет: low
CVSS2: 3.7
CVSS3: 4.2

Описание

CISOfy Lynis before 3.0.0 has Incorrect Access Control because of a TOCTOU race condition. The routine to check the log and report file permissions was not working as intended and could be bypassed locally. Because of the race, an unprivileged attacker can set up a log and report file, and control that up to the point where the specific routine is doing its check. After that, the file can be removed, recreated, and used for additional attacks.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

3.0.0-1
eoan

ignored

end of life
esm-apps/bionic

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

not-affected

3.0.0-1
esm-apps/noble

not-affected

3.0.0-1
esm-apps/xenial

needs-triage

esm-infra-legacy/trusty

DNE

focal

ignored

end of standard support, was needs-triage

Показывать по

3.7 Low

CVSS2

4.2 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.2
nvd
больше 5 лет назад

CISOfy Lynis before 3.0.0 has Incorrect Access Control because of a TOCTOU race condition. The routine to check the log and report file permissions was not working as intended and could be bypassed locally. Because of the race, an unprivileged attacker can set up a log and report file, and control that up to the point where the specific routine is doing its check. After that, the file can be removed, recreated, and used for additional attacks.

CVSS3: 4.2
debian
больше 5 лет назад

CISOfy Lynis before 3.0.0 has Incorrect Access Control because of a TO ...

CVSS3: 4.2
github
больше 3 лет назад

CISOfy Lynis before 3.0.0 has Incorrect Access Control because of a TOCTOU race condition. The routine to check the log and report file permissions was not working as intended and could be bypassed locally. Because of the race, an unprivileged attacker can set up a log and report file, and control that up to the point where the specific routine is doing its check. After that, the file can be removed, recreated, and used for additional attacks.

3.7 Low

CVSS2

4.2 Medium

CVSS3