Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-7040

Опубликовано: 21 янв. 2020
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 9.3
CVSS3: 8.1

Описание

storeBackup.pl in storeBackup through 3.5 relies on the /tmp/storeBackup.lock pathname, which allows symlink attacks that possibly lead to privilege escalation. (Local users can also create a plain file named /tmp/storeBackup.lock to block use of storeBackup until an admin manually deletes that file.)

РелизСтатусПримечание
bionic

released

3.2.1-1+deb8u1build0.18.04.1
devel

not-affected

3.2.1-2
disco

ignored

end of life
eoan

ignored

end of life
esm-apps/bionic

released

3.2.1-1+deb8u1build0.18.04.1
esm-apps/focal

released

3.2.1-1+deb8u1build0.20.04.1
esm-apps/xenial

released

3.2.1-1+deb8u1build0.16.04.1
esm-infra-legacy/trusty

DNE

focal

released

3.2.1-1+deb8u1build0.20.04.1
precise/esm

DNE

Показывать по

EPSS

Процентиль: 90%
0.05192
Низкий

9.3 Critical

CVSS2

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.1
nvd
около 6 лет назад

storeBackup.pl in storeBackup through 3.5 relies on the /tmp/storeBackup.lock pathname, which allows symlink attacks that possibly lead to privilege escalation. (Local users can also create a plain file named /tmp/storeBackup.lock to block use of storeBackup until an admin manually deletes that file.)

CVSS3: 8.1
debian
около 6 лет назад

storeBackup.pl in storeBackup through 3.5 relies on the /tmp/storeBack ...

suse-cvrf
около 6 лет назад

Security update for storeBackup

CVSS3: 8.1
github
больше 3 лет назад

storeBackup.pl in storeBackup through 3.5 relies on the /tmp/storeBackup.lock pathname, which allows symlink attacks that possibly lead to privilege escalation. (Local users can also create a plain file named /tmp/storeBackup.lock to block use of storeBackup until an admin manually deletes that file.)

EPSS

Процентиль: 90%
0.05192
Низкий

9.3 Critical

CVSS2

8.1 High

CVSS3