MEDIUM · 5.5

CVE-2020-3812

qmail-verify as used in netqmail 1.06 is prone to an information disclosure vulnerability. A local attacker can test for the existence of files and directories anywhere in the filesystem because qmail...

Vulnerability Description

qmail-verify as used in netqmail 1.06 is prone to an information disclosure vulnerability. A local attacker can test for the existence of files and directories anywhere in the filesystem because qmail-verify runs as root and tests for the existence of files in the attacker's home directory, without dropping its privileges first.

CVSS Score

5.5

MEDIUM

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
NetqmailNetqmail1.06
DebianDebian Linux8.0
CanonicalUbuntu Linux20.04

Related Weaknesses (CWE)

References

FAQ

What is CVE-2020-3812?

CVE-2020-3812 is a vulnerability with a CVSS score of 5.5 (MEDIUM). qmail-verify as used in netqmail 1.06 is prone to an information disclosure vulnerability. A local attacker can test for the existence of files and directories anywhere in the filesystem because qmail...

How severe is CVE-2020-3812?

CVE-2020-3812 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2020-3812?

Check the references section above for vendor advisories and patch information. Affected products include: Netqmail Netqmail, Debian Debian Linux, Canonical Ubuntu Linux.