CVE-2020-3812
Debian Security Advisory 4692-1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
qmail-verify as used in netqmail 1.06 is prone to an information disclosure vulnerability. A local attacker can test for the existence of files and directories anywhere in the filesystem because qmail-verify runs as root and tests for the existence of files in the attacker's home directory, without dropping its privileges first.
qmail-verify como es usado en netqmail versión 1.06, es propenso a una vulnerabilidad de divulgación de información. Un atacante local puede probar la existencia de archivos y directorios en cualquier parte del sistema de archivos porque qmail-verified es ejecutado como root y prueba la existencia de archivos en el directorio de inicio del atacante, sin perder sus privilegios primero.
It was discovered that netqmail did not properly handle certain input. Both remote and local attackers could use this vulnerability to cause netqmail to crash or execute arbitrary code. It was discovered that netqmail did not properly handle certain input when validating email addresses. An attacker could use this to bypass email address validation. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-12-17 CVE Reserved
- 2020-05-21 CVE Published
- 2020-05-21 First Exploit
- 2024-09-16 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-269: Improper Privilege Management
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
https://bugs.debian.org/961060 | Issue Tracking | |
https://lists.debian.org/debian-lts-announce/2020/06/msg00002.html | Mailing List |
|
https://www.debian.org/security/2020/dsa-4692 | Third Party Advisory |
|
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/157805 | 2020-05-21 | |
https://www.openwall.com/lists/oss-security/2020/05/19/8 | 2024-09-16 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://usn.ubuntu.com/4556-1 | 2022-04-28 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Netqmail Search vendor "Netqmail" | Netqmail Search vendor "Netqmail" for product "Netqmail" | 1.06 Search vendor "Netqmail" for product "Netqmail" and version "1.06" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 20.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "20.04" | lts |
Affected
|