CVE-2020-3812

qmail-verify as used in netqmail 1.06 is prone to an information disclosure vulnerability. A local attacker can test for the existence of files and directories anywhere in the filesystem because qmail-verify runs as root and tests for the existence of files in the attacker's home directory, without dropping its privileges first.
References
Link Resource
https://bugs.debian.org/961060 Issue Tracking Third Party Advisory
https://www.openwall.com/lists/oss-security/2020/05/19/8 Exploit Mailing List
https://www.debian.org/security/2020/dsa-4692 Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/06/msg00002.html Mailing List Third Party Advisory
https://usn.ubuntu.com/4556-1/ Third Party Advisory
Configurations

Configuration 1

cpe:2.3:a:netqmail:netqmail:1.06:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*

Information

Published : 2020-05-26 01:15

Updated : 2022-04-28 07:30


NVD link : CVE-2020-3812

Mitre link : CVE-2020-3812

Products Affected
No products.
CWE
CWE-250

Execution with Unnecessary Privileges