First published: Wed Oct 07 2020(Updated: )
Sympa through 6.2.57b.2 allows a local privilege escalation from the sympa user account to full root access by modifying the sympa.conf configuration file (which is owned by sympa) and parsing it through the setuid sympa_newaliases-wrapper executable.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/sympa | <=6.2.60~dfsg-4<=6.2.70~dfsg-2<=6.2.72~dfsg-1 | |
Sympa Sympa | <=6.2.56 | |
Sympa Sympa | =6.2.57-beta1 | |
Sympa Sympa | =6.2.57-beta2 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-26880 has a high severity level due to its potential for local privilege escalation to root access.
To fix CVE-2020-26880, update Sympa to version 6.2.60 or later.
CVE-2020-26880 affects Sympa versions up to 6.2.57b.2 and those specific versions listed in the advisory.
No, CVE-2020-26880 requires local access to exploit the vulnerability.
CVE-2020-26880 is classified as a local privilege escalation vulnerability.