First published: Thu Jun 18 2020(Updated: )
CISOfy Lynis before 3.0.0 has Incorrect Access Control because of a TOCTOU race condition. The routine to check the log and report file permissions was not working as intended and could be bypassed locally. Because of the race, an unprivileged attacker can set up a log and report file, and control that up to the point where the specific routine is doing its check. After that, the file can be removed, recreated, and used for additional attacks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CISOfy Lynis | <3.0.0 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13882 has a medium severity rating due to the potential for unauthorized access caused by a TOCTOU race condition.
To fix CVE-2020-13882, upgrade to CISOfy Lynis version 3.0.0 or later.
CVE-2020-13882 affects CISOfy Lynis versions prior to 3.0.0 and Fedora versions 31 and 32.
Yes, CVE-2020-13882 can be exploited locally by an unprivileged attacker due to incorrect access control.
CVE-2020-13882 is categorized as a race condition vulnerability, specifically a Time-of-check to Time-of-use (TOCTOU) issue.