Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2020-26880

Published: 7 October 2020

Sympa through 6.2.57b.2 allows a local privilege escalation from the sympa user account to full root access by modifying the sympa.conf configuration file (which is owned by sympa) and parsing it through the setuid sympa_newaliases-wrapper executable.

Priority

Medium

Cvss 3 Severity Score

7.8

Score breakdown

Status

Package Release Status
sympa
Launchpad, Ubuntu, Debian
upstream
Released (6.2.62)
kinetic Ignored
(end of life, was needed)
hirsute Ignored
(end of life)
bionic Needed

focal Needed

trusty Does not exist

xenial Needs triage

groovy Ignored
(end of life)
lunar Not vulnerable
(6.2.66~dfsg-2)
impish Ignored
(end of life)
jammy Needed

Patches:
upstream: https://github.com/sympa-community/sympa/pull/1087

Severity score breakdown

Parameter Value
Base score 7.8
Attack vector Local
Attack complexity Low
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H