First published: Mon Feb 24 2020(Updated: )
Sympa 6.2.38 through 6.2.52 allows remote attackers to cause a denial of service (disk consumption from temporary files, and a flood of notifications to listmasters) via a series of requests with malformed parameters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/sympa | <=6.2.40~dfsg-1<=6.2.40~dfsg-3 | 6.2.40~dfsg-4 6.2.40~dfsg-1+deb10u1 |
debian/sympa | 6.2.60~dfsg-4 6.2.70~dfsg-2 6.2.72~dfsg-1 | |
Sympa Sympa | >=6.2.38<=6.2.52 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
Debian GNU/Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-9369 has a severity level that can lead to denial of service due to increased disk consumption and notification flooding.
To fix CVE-2020-9369, upgrade Sympa to version 6.2.53 or later.
CVE-2020-9369 affects Sympa versions from 6.2.38 to 6.2.52.
An attacker can exploit CVE-2020-9369 by sending a series of requests with malformed parameters to cause service disruption.
CVE-2020-9369 is present in various Linux distributions, including Debian and Fedora.