qmail-verify as used in netqmail 1.06 is prone to an information disclosure vulnerability. A local attacker can test for the existence of files and directories anywhere in the filesystem because qmail-verify runs as root and tests for the existence of files in the attacker's home directory, without dropping its privileges first.
References
Link | Resource |
---|---|
https://bugs.debian.org/961060 | Issue Tracking Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/06/msg00002.html | Mailing List Third Party Advisory |
https://usn.ubuntu.com/4556-1/ | Third Party Advisory |
https://www.debian.org/security/2020/dsa-4692 | Third Party Advisory |
https://www.openwall.com/lists/oss-security/2020/05/19/8 | Exploit Mailing List Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: debian
Published: 2020-05-19T00:00:00
Updated: 2020-10-05T20:06:17
Reserved: 2019-12-17T00:00:00
Link: CVE-2020-3812
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-05-26T13:15:10.733
Modified: 2022-04-28T19:30:41.607
Link: CVE-2020-3812
JSON object: View
Redhat Information
No data.
CWE