First published: Mon Dec 28 2020(Updated: )
The test suite in libopendkim in OpenDKIM through 2.10.3 allows local users to gain privileges via a symlink attack against the /tmp/testkeys file (related to t-testdata.h, t-setup.c, and t-cleanup.c). NOTE: this is applicable to persons who choose to engage in the "A number of self-test programs are included here for unit-testing the library" situation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenDaylight | <=2.10.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-35766 has a medium severity rating due to the potential privilege escalation via a symlink attack.
To fix CVE-2020-35766, upgrade to the latest version of OpenDKIM that addresses the vulnerability.
CVE-2020-35766 affects local users of OpenDKIM versions up to 2.10.3 who can execute the test suite.
A symlink attack occurs when an attacker creates a symbolic link that redirects to a sensitive file, allowing unauthorized access or privilege escalation.
As a temporary measure, restrict access to the /tmp/testkeys file to prevent unauthorized symlink creation in OpenDKIM.