Bareos 15.2.2

CPE Details

Bareos 15.2.2
15.2.2
2020-05-20
14h14 +00:00
2020-05-20
14h14 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:bareos:bareos:15.2.2:*:*:*:*:*:*:*

Informations

Vendor

bareos

Product

bareos

Version

15.2.2

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2020-4042 2020-07-10 17h30 +00:00 Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to the director itself leading to the director responding to the replayed challenge. The response obtained is then a valid reply to the directors original challenge. This is fixed in version 19.2.8.
6.8
Medium
CVE-2020-11061 2020-07-10 17h25 +00:00 In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director's memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs mitigates the problem. This issue is also patched in Bareos versions 19.2.8, 18.2.9 and 17.2.10.
7.4
High
CVE-2017-14610 2017-09-20 18h00 +00:00 bareos-dir, bareos-fd, and bareos-sd in bareos-core in Bareos 16.2.6 and earlier create a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command.
7.8
High