CVE-2020-35766

The test suite in libopendkim in OpenDKIM through 2.10.3 allows local users to gain privileges via a symlink attack against the /tmp/testkeys file (related to t-testdata.h, t-setup.c, and t-cleanup.c). NOTE: this is applicable to persons who choose to engage in the "A number of self-test programs are included here for unit-testing the library" situation.
References
Link Resource
https://github.com/trusteddomainproject/OpenDKIM/issues/113 Exploit Patch Third Party Advisory
https://github.com/trusteddomainproject/OpenDKIM/issues/113 Exploit Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:opendkim:opendkim:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:28

Type Values Removed Values Added
References () https://github.com/trusteddomainproject/OpenDKIM/issues/113 - Exploit, Patch, Third Party Advisory () https://github.com/trusteddomainproject/OpenDKIM/issues/113 - Exploit, Patch, Third Party Advisory

Information

Published : 2020-12-28 20:15

Updated : 2024-11-21 05:28


NVD link : CVE-2020-35766

Mitre link : CVE-2020-35766

CVE.ORG link : CVE-2020-35766


JSON object : View

Products Affected

opendkim

  • opendkim
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')