First published: Sun May 03 2020(Updated: )
** DISPUTED ** An issue was discovered in FRRouting FRR (aka Free Range Routing) through 7.3.1. When using the split-config feature, the init script creates an empty config file with world-readable default permissions, leading to a possible information leak via tools/frr.in and tools/frrcommon.sh.in. NOTE: some parties consider this user error, not a vulnerability, because the permissions are under the control of the user before any sensitive information is present in the file.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Free Range Routing | <=7.3.1 | |
<=7.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-12831.
CVE-2020-12831 has a severity rating of 5.3 (medium).
CVE-2020-12831 affects FRR versions up to 7.3.1.
CVE-2020-12831 could allow an information leak through a possible information leak via tools/frr.in and tools/frrcommon.sh.in.
A fix has been implemented in FRRouting FRR version 7.3.2 and later.