CVE-2020-8013
LowVulnerability Description
A UNIX Symbolic Link (Symlink) Following vulnerability in chkstat of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15, SUSE Linux Enterprise Server 11 set permissions intended for specific binaries on other binaries because it erroneously followed symlinks. The symlinks can't be controlled by attackers on default systems, so exploitation is difficult. This issue affects: SUSE Linux Enterprise Server 12 permissions versions prior to 2015.09.28.1626-17.27.1. SUSE Linux Enterprise Server 15 permissions versions prior to 20181116-9.23.1. SUSE Linux Enterprise Server 11 permissions versions prior to 2013.1.7-0.6.12.1.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N
Known Affected Software
4 configuration(s) from 2 vendor(s)
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:-:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:-:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:15:-:*:*:*:*:*:*
References & Resources
-
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00010.htmlmeissner@suse.de Mailing List Vendor Advisory
-
https://bugzilla.suse.com/show_bug.cgi?id=1163922meissner@suse.de Issue Tracking Vendor Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00010.htmlaf854a3a-2127-422b-91ae-364da2661108 Mailing List Vendor Advisory
-
https://bugzilla.suse.com/show_bug.cgi?id=1163922af854a3a-2127-422b-91ae-364da2661108 Issue Tracking Vendor Advisory
Severity Details
Weakness Type (CWE)
Improper Link Resolution Before File Access ('Link Following')
- Description
- The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
- Exploit Likelihood
- Medium
- Typical Severity
- Medium
- Abstraction Level
- Base
Key Information
- Published Date
- March 02, 2020
