Lucene search

K
amazonAmazonALAS-2020-1419
HistoryAug 26, 2020 - 11:09 p.m.

Medium: lynis

2020-08-2623:09:00
alas.aws.amazon.com
14

3.7 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:H/Au:N/C:P/I:P/A:P

4.2 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L

0.0004 Low

EPSS

Percentile

14.1%

Issue Overview:

In CISOfy Lynis 2.x through 2.7.5, the license key can be obtained by looking at the process list when a data upload is being performed. This license can be used to upload data to a central Lynis server. Although no data can be extracted by knowing the license key, it may be possible to upload the data of additional scans. (CVE-2019-13033)
For additional information:
https://nvd.nist.gov/vuln/detail/cve-2019-13033

CISOfy Lynis before 3.0.0 has Incorrect Access Control because of a TOCTOU race condition. The routine to check the log and report file permissions was not working as intended and could be bypassed locally. Because of the race, an unprivileged attacker can set up a log and report file, and control that up to the point where the specific routine is doing its check. After that, the file can be removed, recreated, and used for additional attacks. (CVE-2020-13882)
For additional information:
https://nvd.nist.gov/vuln/detail/cve-2020-13882

Affected Packages:

lynis

Issue Correction:
Run yum update lynis to update your system.

New Packages:

noarch:  
    lynis-3.0.0-1.17.amzn1.noarch  
  
src:  
    lynis-3.0.0-1.17.amzn1.src  

Additional References

Red Hat: CVE-2019-13033, CVE-2020-13882

Mitre: CVE-2019-13033, CVE-2020-13882

OSVersionArchitecturePackageVersionFilename
Amazon Linux1noarchlynis< 3.0.0-1.17.amzn1lynis-3.0.0-1.17.amzn1.noarch.rpm

3.7 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:H/Au:N/C:P/I:P/A:P

4.2 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L

0.0004 Low

EPSS

Percentile

14.1%