CVE-2020-15861Link Following in Net-snmp

Severity
7.8HIGHNVD
EPSS
0.4%
top 37.25%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 20
Latest updateMay 24

Description

Net-SNMP through 5.7.3 allows Escalation of Privileges because of UNIX symbolic link (symlink) following.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

Debiannet-snmp/net-snmp< 5.8+dfsg-5+3
Ubuntunet-snmp/net-snmp< 5.7.3+dfsg-1ubuntu4.5+6

Also affects: Ubuntu Linux 12.04, 14.04, 16.04, 18.04, 20.04

Patches

🔴Vulnerability Details

5
GHSA
GHSA-mfrp-422x-34qv: Net-SNMP through 52022-05-24
OSV
net-snmp regression2020-09-01
OSV
net-snmp vulnerabilities2020-08-24
OSV
CVE-2020-15861: Net-SNMP through 52020-08-20
CVEList
CVE-2020-15861: Net-SNMP through 52020-08-19

📋Vendor Advisories

4
Ubuntu
Net-SNMP regression2020-09-01
Ubuntu
Net-SNMP vulnerabilities2020-08-24
Red Hat
net-snmp: combination with can lead to elevated permissions to root2020-07-31
Debian
CVE-2020-15861: net-snmp - Net-SNMP through 5.7.3 allows Escalation of Privileges because of UNIX symbolic ...2020

💬Community

2
Bugzilla
CVE-2020-15861 net-snmp: combination with can lead to elevated permissions to root2020-07-31
Bugzilla
CVE-2020-15861 net-snmp: combination with can lead to elevated permissions to root [fedora-all]2020-07-31
CVE-2020-15861 — Link Following in Net-snmp | cvebase