Privilege escalation in Net-snmp



Published: 2020-08-17
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2020-15861
CWE-ID CWE-61
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Net-snmp
Server applications / Remote management servers, RDP, SSH

Vendor net-snmp.sourceforge.net

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) UNIX symbolic link following

EUVDB-ID: #VU45744

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2020-15861

CWE-ID: CWE-61 - UNIX Symbolic Link (Symlink) Following

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a symlink following issue in snmpd. A local user can bypass implemented security mechanism via *snmp-mibs-downloader package* and execute arbitrary commands on the system as root.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Net-snmp: 5.0 - 5.8.pre3


CPE2.3 External links

http://github.com/net-snmp/net-snmp/commit/4fd9a450444a434a993bc72f7c3486ccce41f602
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966599

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###