Vulnerabilities > CVE-2020-8015 - Unspecified vulnerability in Exim

047910
CVSS 7.8 - HIGH
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
LOW
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
local
low complexity
exim
nessus

Summary

A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of exim in openSUSE Factory allows local attackers to escalate from user mail to root. This issue affects: openSUSE Factory exim versions prior to 4.93.0.4-3.1.

Vulnerable Configurations

Part Description Count
Application
Exim
141
OS
Opensuse
1

Nessus

  • NASL familySMTP problems
    NASL idEXIM_4_93.NASL
    descriptionAccording to its banner, the version of Exim running on the remote host is prior to 4.93. It is, therefore, potentially affected by a privilege escalation vulnerability. A flaw exists in the UNIX symbolic link that could allow an attacker to execute to escalate from the mail user to root.
    last seen2020-04-14
    modified2020-04-10
    plugin id135311
    published2020-04-10
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/135311
    titleExim < 4.93 Privilege Escalation vulnerability
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include('compat.inc');
    
    if (description)
    {
      script_id(135311);
      script_version("1.3");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/04/13");
    
      script_cve_id("CVE-2020-8015");
      script_xref(name:"IAVA", value:"2020-A-0131");
    
      script_name(english:"Exim < 4.93 Privilege Escalation vulnerability");
      script_summary(english:"Checks the version of the SMTP banner.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote mail server is potentially affected by a privilege escalation 
    vulnerability.");
      script_set_attribute(attribute:"description", value:
    "According to its banner, the version of Exim running on the remote
    host is prior to 4.93. It is, therefore, potentially 
    affected by a privilege escalation vulnerability. A flaw exists
    in the UNIX symbolic link that could allow an attacker to execute
     to escalate from the mail user to root.");
      # https://bugzilla.suse.com/show_bug.cgi?id=1154183
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?f294b9cf");
      # https://access.redhat.com/security/cve/cve-2020-8015
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?cc28c77b");
      # https://vulmon.com/vulnerabilitydetails?qid=CVE-2020-8015
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?728dbb7f");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to Exim 4.93 or later.");
      script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-8015");
    
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2020/04/01");
      script_set_attribute(attribute:"patch_publication_date", value:"2020/04/10");
      script_set_attribute(attribute:"plugin_publication_date", value:"2020/04/10");
    
      script_set_attribute(attribute:"potential_vulnerability", value:"true");
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:exim:exim");
      script_set_attribute(attribute:"stig_severity", value:"I");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"SMTP problems");
    
      script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("smtpserver_detect.nasl");
      script_require_keys("Settings/ParanoidReport");
      script_require_ports("Services/smtp", 25);
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("smtp_func.inc");
    
    if (report_paranoia < 2) audit(AUDIT_PARANOID);
    
    port = get_service(svc:"smtp", default:25, exit_on_fail:TRUE);
    
    banner = get_smtp_banner(port:port);
    if (!banner) audit(AUDIT_NO_BANNER, port);
    if ("Exim" >!< banner) audit(AUDIT_NOT_LISTEN, 'Exim', port);
    
    matches = pregmatch(pattern:"220.*Exim ([0-9\._]+)", string:banner);
    if (isnull(matches)) audit(AUDIT_SERVICE_VER_FAIL, 'Exim', port);
    
    version = matches[1];
    # Underscore was added to the vesion
    version = ereg_replace(string:version, pattern:'_', replace:'.');
    
    if (ver_compare(ver:version, fix:'4.93', strict:FALSE) < 0)
    {
      report =
        '\n  Banner            : ' + banner +
        '\n  Installed version : ' + version +
        '\n  Fixed version     : 4.93';
    
      security_report_v4(port:port, severity:SECURITY_HOLE, extra:report);
    }
    else audit(AUDIT_LISTEN_NOT_VULN, 'Exim', port, version);
    
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2020-491.NASL
    descriptionThis update for exim fixes the following issues : - CVE-2020-8015: Fixed a local privilege escalation from user mail to root (boo#1154183).
    last seen2020-04-16
    modified2020-04-10
    plugin id135386
    published2020-04-10
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/135386
    titleopenSUSE Security Update : exim (openSUSE-2020-491)