Lucene search

K
debianDebianDEBIAN:DLA-2441-1:F381D
HistoryNov 09, 2020 - 1:04 p.m.

[SECURITY] [DLA 2441-1] sympa security update

2020-11-0913:04:02
lists.debian.org
15

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

14.5%


Debian LTS Advisory DLA-2441-1 [email protected]
https://www.debian.org/lts/security/
November 09, 2020 https://wiki.debian.org/LTS


Package : sympa
Version : 6.2.16~dfsg-3+deb9u4
CVE ID : CVE-2018-1000671 CVE-2020-26880
Debian Bug : 908165 972189

A privilege escalation was discovered in Sympa, a modern mailing list
manager. It is fixed when Sympa is used in conjunction with common
MTAs (such as Exim or Postfix) by disabling a setuid executable,
although no fix is currently available for all environments (such as
sendmail). Additionally, an open-redirect vulnerability was
discovered and fixed.

CVE-2020-26880

Sympa allows a local privilege escalation from the sympa user
account to full root access by modifying the sympa.conf
configuration file (which is owned by sympa) and parsing it
through the setuid sympa_newaliases-wrapper executable.

CVE-2018-1000671

Sympa contains a CWE-601: URL Redirection to Untrusted Site ('Open
Redirect') vulnerability in The "referer" parameter of the
wwsympa.fcgi login action. that can result in Open redirection and
reflected XSS via data URIs.

For Debian 9 stretch, these problems have been fixed in version
6.2.16~dfsg-3+deb9u4.

We recommend that you upgrade your sympa packages.

For the detailed security status of sympa please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/sympa

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

14.5%