7.8

CVE-2020-8019

Exploit

A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of syslog-ng of SUSE Linux Enterprise Debuginfo 11-SP3, SUSE Linux Enterprise Debuginfo 11-SP4, SUSE Linux Enterprise Module for Legacy Software 12, SUSE Linux Enterprise Point of Sale 11-SP3, SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Linux Enterprise Server for SAP 12-SP1; openSUSE Backports SLE-15-SP1, openSUSE Leap 15.1 allowed local attackers controlling the user news to escalate their privileges to root. This issue affects: SUSE Linux Enterprise Debuginfo 11-SP3 syslog-ng versions prior to 2.0.9-27.34.40.5.1. SUSE Linux Enterprise Debuginfo 11-SP4 syslog-ng versions prior to 2.0.9-27.34.40.5.1. SUSE Linux Enterprise Module for Legacy Software 12 syslog-ng versions prior to 3.6.4-12.8.1. SUSE Linux Enterprise Point of Sale 11-SP3 syslog-ng versions prior to 2.0.9-27.34.40.5.1. SUSE Linux Enterprise Server 11-SP4-LTSS syslog-ng versions prior to 2.0.9-27.34.40.5.1. SUSE Linux Enterprise Server for SAP 12-SP1 syslog-ng versions prior to 3.6.4-12.8.1. openSUSE Backports SLE-15-SP1 syslog-ng versions prior to 3.19.1-bp151.4.6.1. openSUSE Leap 15.1 syslog-ng versions prior to 3.19.1-lp151.3.6.1.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
OneidentitySyslog-ng Version < 2.0.9-27.34.40.5.1
   SuseLinux Enterprise Debuginfo Version11 Updatesp3
OneidentitySyslog-ng Version < 2.0.9-27.34.40.5.1
   SuseLinux Enterprise Debuginfo Version11 Updatesp4
OneidentitySyslog-ng Version < 3.6.4-12.8.1
OneidentitySyslog-ng Version < 2.0.9-27.34.40.5.1
   SuseLinux Enterprise Point Of Sale Version11 Updatesp3
OneidentitySyslog-ng Version < 2.0.9-27.34.40.5.1
   SuseLinux Enterprise Server Version11 Updatesp4 SwEditionltss
OneidentitySyslog-ng Version < 3.6.4-12.8.1
   SuseLinux Enterprise Server Version12 Updatesp1 SwPlatformsap
OneidentitySyslog-ng Version < 3.19.1-bp151.4.6.1
   OpensuseBackports Sle Version15.0 Updatesp1
OneidentitySyslog-ng Version < 3.19.1-lp151.3.6.1
   OpensuseLeap Version15.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.091
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.2 3.9 10
AV:L/AC:L/Au:N/C:C/I:C/A:C
meissner@suse.de 7.7 2.5 5.2
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CWE-61 UNIX Symbolic Link (Symlink) Following

The product, when opening a file or directory, does not sufficiently account for when the file is a symbolic link that resolves to a target outside of the intended control sphere. This could allow an attacker to cause the product to operate on unauthorized files.