Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-4042
HistoryJul 10, 2020 - 12:00 a.m.

CVE-2020-4042

2020-07-1000:00:00
ubuntu.com
ubuntu.com
13

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N

EPSS

0.001

Percentile

38.7%

Bareos before version 19.2.8 and earlier allows a malicious client to
communicate with the director without knowledge of the shared secret if the
director allows client initiated connection and connects to the client
itself. The malicious client can replay the Bareos director’s cram-md5
challenge to the director itself leading to the director responding to the
replayed challenge. The response obtained is then a valid reply to the
directors original challenge. This is fixed in version 19.2.8.

OSVersionArchitecturePackageVersionFilename
ubuntu16.04noarchbareos< anyUNKNOWN

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N

EPSS

0.001

Percentile

38.7%