First published: Thu Jan 09 2020(Updated: )
LTSP LDM through 2.18.06 allows fat-client root access because the LDM_USERNAME variable may have an empty value if the user's shell lacks support for Bourne shell syntax. This is related to a run-x-session script.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/ldm | 2:2.18.06-1+deb10u1 | |
Debian Linux | =8.0 | |
Debian Linux | =9.0 | |
Debian Linux | =10.0 | |
LTSP LDM | <=2.18.06 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-20373 is considered a high-risk vulnerability due to its potential to allow root access to fat clients.
To fix CVE-2019-20373, upgrade to the patched version 2:2.18.06-1+deb10u1 or later for the ldm package.
CVE-2019-20373 affects Debian Linux versions 8.0, 9.0, and 10.0, as well as LTSP LDM versions up to 2.18.06.
CVE-2019-20373 is caused by the LDM_USERNAME variable potentially having an empty value in certain shell environments.
Yes, CVE-2019-20373 can be exploited remotely, leading to unauthorized root access on vulnerable systems.