Description
Net-SNMP through 5.7.3 allows Escalation of Privileges because of UNIX symbolic link (symlink) following.
References (6)
Core 6
Core References
Issue Tracking, Third Party Advisory x_refsource_confirm
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966599
Patch, Third Party Advisory x_refsource_confirm
https://github.com/net-snmp/net-snmp/commit/4fd9a450444a434a993bc72f7c3486ccce41f602
Third Party Advisory x_refsource_confirm
https://github.com/net-snmp/net-snmp/issues/145
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/202008-12
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/4471-1/
Third Party Advisory x_refsource_confirm
https://security.netapp.com/advisory/ntap-20200904-0001/
Scores
CVSS v3
7.8
EPSS
0.0043
EPSS Percentile
62.8%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-59
Status
published
Products (9)
canonical/ubuntu_linux
12.04
canonical/ubuntu_linux
14.04
canonical/ubuntu_linux
16.04
canonical/ubuntu_linux
18.04
canonical/ubuntu_linux
20.04
net-snmp/net-snmp
< 5.7.3
netapp/cloud_backup
netapp/smi-s_provider
netapp/solidfire_\&_hci_management_node
Published
Aug 20, 2020
Tracked Since
Feb 18, 2026