Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to the director itself leading to the director responding to the replayed challenge. The response obtained is then a valid reply to the directors original challenge. This is fixed in version 19.2.8.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2020-07-10T19:30:14
Updated: 2024-08-04T07:52:20.708Z
Reserved: 2019-12-30T00:00:00
Link: CVE-2020-4042
Vulnrichment
No data.
NVD
Status : Modified
Published: 2020-07-10T20:15:11.250
Modified: 2024-11-21T05:32:12.493
Link: CVE-2020-4042
Redhat
No data.