Vulnerability Details : CVE-2020-8013
A UNIX Symbolic Link (Symlink) Following vulnerability in chkstat of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15, SUSE Linux Enterprise Server 11 set permissions intended for specific binaries on other binaries because it erroneously followed symlinks. The symlinks can't be controlled by attackers on default systems, so exploitation is difficult. This issue affects: SUSE Linux Enterprise Server 12 permissions versions prior to 2015.09.28.1626-17.27.1. SUSE Linux Enterprise Server 15 permissions versions prior to 20181116-9.23.1. SUSE Linux Enterprise Server 11 permissions versions prior to 2013.1.7-0.6.12.1.
Products affected by CVE-2020-8013
- cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:15:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-8013
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 18 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-8013
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
1.9
|
LOW | AV:L/AC:M/Au:N/C:N/I:P/A:N |
3.4
|
2.9
|
NIST | |
2.2
|
LOW | CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N |
0.8
|
1.4
|
SUSE | |
2.5
|
LOW | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N |
1.0
|
1.4
|
NIST |
CWE ids for CVE-2020-8013
-
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.Assigned by:
- meissner@suse.de (Primary)
- nvd@nist.gov (Secondary)
References for CVE-2020-8013
-
https://bugzilla.suse.com/show_bug.cgi?id=1163922
Bug 1163922 – VUL-0: CVE-2020-8013: permissions: chkstat sets unintended setuid/capabilities for mrsh and wodimIssue Tracking;Vendor Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00010.html
[security-announce] openSUSE-SU-2020:0302-1: moderate: Security update fMailing List;Vendor Advisory
Jump to