A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of kopano-spamd of openSUSE Leap 15.1, openSUSE Tumbleweed allowed local attackers with the privileges of the kopano user to escalate to root. This issue affects: openSUSE Leap 15.1 kopano-spamd versions prior to 10.0.5-lp151.4.1. openSUSE Tumbleweed kopano-spamd versions prior to 10.0.5-1.1.
References
Link | Resource |
---|---|
https://bugzilla.suse.com/show_bug.cgi?id=1164131 | Exploit Issue Tracking Vendor Advisory |
https://bugzilla.suse.com/show_bug.cgi?id=1164131 | Exploit Issue Tracking Vendor Advisory |
Configurations
History
21 Nov 2024, 05:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.suse.com/show_bug.cgi?id=1164131 - Exploit, Issue Tracking, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 7.7 |
Information
Published : 2020-06-29 12:15
Updated : 2024-11-21 05:38
NVD link : CVE-2020-8014
Mitre link : CVE-2020-8014
CVE.ORG link : CVE-2020-8014
JSON object : View
Products Affected
opensuse
- tumbleweed_kopano-spamd
- leap
CWE
CWE-61
UNIX Symbolic Link (Symlink) Following