qmail-verify as used in netqmail 1.06 is prone to an information disclosure vulnerability. A local attacker can test for the existence of files and directories anywhere in the filesystem because qmail-verify runs as root and tests for the existence of files in the attacker's home directory, without dropping its privileges first.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Link | Tags |
---|---|
https://www.openwall.com/lists/oss-security/2020/05/19/8 | patch mailing list exploit third party advisory |
https://bugs.debian.org/961060 | third party advisory issue tracking |
https://www.debian.org/security/2020/dsa-4692 | third party advisory |
https://lists.debian.org/debian-lts-announce/2020/06/msg00002.html | third party advisory mailing list |
https://usn.ubuntu.com/4556-1/ | third party advisory vendor advisory |