Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.892441
Category:Debian Local Security Checks
Title:Debian LTS: Security Advisory for sympa (DLA-2441-1)
Summary:The remote host is missing an update for the 'sympa'; package(s) announced via the DLA-2441-1 advisory.
Description:Summary:
The remote host is missing an update for the 'sympa'
package(s) announced via the DLA-2441-1 advisory.

Vulnerability Insight:
A privilege escalation was discovered in Sympa, a modern mailing list
manager. It is fixed when Sympa is used in conjunction with common
MTAs (such as Exim or Postfix) by disabling a setuid executable,
although no fix is currently available for all environments (such as
sendmail). Additionally, an open-redirect vulnerability was
discovered and fixed.

CVE-2020-26880

Sympa allows a local privilege escalation from the sympa user
account to full root access by modifying the sympa.conf
configuration file (which is owned by sympa) and parsing it
through the setuid sympa_newaliases-wrapper executable.

CVE-2018-1000671

Sympa contains a CWE-601: URL Redirection to Untrusted Site ('Open
Redirect') vulnerability in The 'referer' parameter of the
wwsympa.fcgi login action. that can result in Open redirection and
reflected XSS via data URIs.

Affected Software/OS:
'sympa' package(s) on Debian Linux.

Solution:
For Debian 9 stretch, these problems have been fixed in version
6.2.16~
dfsg-3+deb9u4.

We recommend that you upgrade your sympa packages.

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2018-1000671
Common Vulnerability Exposure (CVE) ID: CVE-2020-26880
CopyrightCopyright (C) 2020 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.