Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to the director itself leading to the director responding to the replayed challenge. The response obtained is then a valid reply to the directors original challenge. This is fixed in version 19.2.8.
Advisories
Source ID Title
EUVD EUVD EUVD-2020-25302 Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to the director itself leading to the director responding to the replayed challenge. The response obtained is then a valid reply to the directors original challenge. This is fixed in version 19.2.8.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-04T07:52:20.708Z

Reserved: 2019-12-30T00:00:00

Link: CVE-2020-4042

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-07-10T20:15:11.250

Modified: 2024-11-21T05:32:12.493

Link: CVE-2020-4042

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.