Lucene search

K
cveGitHub_MCVE-2020-11061
HistoryJul 10, 2020 - 8:15 p.m.

CVE-2020-11061

2020-07-1020:15:11
CWE-787
CWE-122
GitHub_M
web.nvd.nist.gov
77
bareos
director
cve-2020-11061
heap overflow
vulnerability
nvd

CVSS2

6

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L

AI Score

7.2

Confidence

High

EPSS

0.002

Percentile

59.4%

In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director’s memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs mitigates the problem. This issue is also patched in Bareos versions 19.2.8, 18.2.9 and 17.2.10.

Affected configurations

Nvd
Vulners
Node
bareosbareosRange16.2.10
OR
bareosbareosRange17.2.417.2.9
OR
bareosbareosRange18.2.518.2.8
OR
bareosbareosRange18.4.119.2.7
OR
bareosbareosMatch18.2.4rc1
OR
bareosbareosMatch18.2.4rc2
Node
debiandebian_linuxMatch9.0
VendorProductVersionCPE
bareosbareos*cpe:2.3:a:bareos:bareos:*:*:*:*:*:*:*:*
bareosbareos18.2.4cpe:2.3:a:bareos:bareos:18.2.4:rc1:*:*:*:*:*:*
bareosbareos18.2.4cpe:2.3:a:bareos:bareos:18.2.4:rc2:*:*:*:*:*:*
debiandebian_linux9.0cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Bareos Director",
    "vendor": "Bareos GmbH & Co. KG",
    "versions": [
      {
        "status": "affected",
        "version": "<= 16.2.10"
      },
      {
        "status": "affected",
        "version": "<= 17.2.9"
      },
      {
        "status": "affected",
        "version": "<= 18.2.8"
      },
      {
        "status": "affected",
        "version": "<= 19.2.7"
      }
    ]
  }
]

CVSS2

6

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L

AI Score

7.2

Confidence

High

EPSS

0.002

Percentile

59.4%