CVE-2020-4042

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-4042
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-4042.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-4042
Related
Published
2020-07-10T20:15:11Z
Modified
2025-01-08T07:26:43.419108Z
Severity
  • 6.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to the director itself leading to the director responding to the replayed challenge. The response obtained is then a valid reply to the directors original challenge. This is fixed in version 19.2.8.

References

Affected packages

Git / github.com/bareos/bareos

Affected ranges

Type
GIT
Repo
https://github.com/bareos/bareos
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Last affected

Affected versions

Release/12.*

Release/12.4.0
Release/12.4.1

Release/15.*

Release/15.2.1
Release/15.2.2
Release/15.2.3
Release/15.2.4

Release/16.*

Release/16.2.4
Release/16.2.4-rc1
Release/16.2.5
Release/16.2.5-win-installer-fix
Release/16.2.6
Release/16.2.7
Release/16.2.8

Release/17.*

Release/17.2.4
Release/17.2.4-rc1
Release/17.2.4-rc2
Release/17.2.5
Release/17.2.6
Release/17.2.7

Release/18.*

Release/18.2.4-rc1
Release/18.2.4-rc2
Release/18.2.5
Release/18.4.1

Release/19.*

Release/19.2.4
Release/19.2.4-rc1
Release/19.2.5
Release/19.2.6

Release/bacula-5.*

Release/bacula-5.2.13

WIP/17.*

WIP/17.2.8-pre

WIP/19.*

WIP/19.2.4-pre
WIP/19.2.5-pre
WIP/19.2.6-pre
WIP/19.2.7-pre