| Vulnerability Name: | CVE-2019-20373 (CCN-174251) | ||||||||||||||||
| Assigned: | 2020-01-09 | ||||||||||||||||
| Published: | 2020-01-09 | ||||||||||||||||
| Updated: | 2020-01-24 | ||||||||||||||||
| Summary: | LTSP LDM through 2.18.06 allows fat-client root access because the LDM_USERNAME variable may have an empty value if the user's shell lacks support for Bourne shell syntax. This is related to a run-x-session script. | ||||||||||||||||
| CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||
| CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||||||||||
| Vulnerability Type: | CWE-noinfo | ||||||||||||||||
| Vulnerability Consequences: | Gain Privileges | ||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2019-20373 Source: XF Type: UNKNOWN ltsp-ldm-cve201920373-priv-esc(174251) Source: MISC Type: Patch, Third Party Advisory https://git.launchpad.net/~ltsp-upstream/ltsp/+git/ldm/commit/?id=c351ac69ef63ed6c84221cef73e409059661b8ba Source: CCN Type: Debian Mailing List, Fri, 10 Jan 2020 15:06:58 +0000 [DLA 2064-1] ldm security update Source: MLIST Type: Mailing List, Patch, Third Party Advisory [debian-lts-announce] 20200110 [SECURITY] [DLA 2064-1] ldm security update Source: CCN Type: LTSP Web site Linux Terminal Server Project Source: DEBIAN Type: Third Party Advisory DSA-4601 Source: CCN Type: WhiteSource Vulnerability Database CVE-2019-20373 | ||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||
| Oval Definitions | |||||||||||||||||
| |||||||||||||||||
| BACK | |||||||||||||||||