Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2020-26880

Published: 7 October 2020

Sympa through 6.2.57b.2 allows a local privilege escalation from the sympa user account to full root access by modifying the sympa.conf configuration file (which is owned by sympa) and parsing it through the setuid sympa_newaliases-wrapper executable.

Priority

Medium

Cvss 3 Severity Score

7.8

Score breakdown

Status

Package Release Status
sympa
Launchpad, Ubuntu, Debian
bionic Needed

focal Needed

groovy Ignored
(reached end-of-life)
hirsute Ignored
(reached end-of-life)
impish Ignored
(reached end-of-life)
jammy Needed

kinetic Needed

precise Does not exist

trusty Does not exist

upstream
Released (6.2.62)
xenial Needs triage

Patches:
upstream: https://github.com/sympa-community/sympa/pull/1087

Severity score breakdown

Parameter Value
Base score 7.8
Attack vector Local
Attack complexity Low
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H