CVE Vulnerabilities

CVE-2020-14367

Improper Link Resolution Before File Access ('Link Following')

Published: Aug 24, 2020 | Modified: Nov 07, 2023
CVSS 3.x
6
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
CVSS 2.x
3.6 LOW
AV:L/AC:L/Au:N/C:N/I:P/A:P
RedHat/V2
RedHat/V3
5.1 MODERATE
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L
Ubuntu
MEDIUM

A flaw was found in chrony versions before 3.5.1 when creating the PID file under the /var/run/chrony folder. The file is created during chronyd startup while still running as the root user, and when its opened for writing, chronyd does not check for an existing symbolic link with the same file name. This flaw allows an attacker with privileged access to create a symlink with the default PID file name pointing to any destination file in the system, resulting in data loss and a denial of service due to the path traversal.

Weakness

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Affected Software

Name Vendor Start Version End Version
Chrony Tuxfamily * 3.5.1 (excluding)
Chrony Ubuntu bionic *
Chrony Ubuntu devel *
Chrony Ubuntu esm-apps/xenial *
Chrony Ubuntu esm-infra-legacy/trusty *
Chrony Ubuntu focal *
Chrony Ubuntu groovy *
Chrony Ubuntu hirsute *
Chrony Ubuntu impish *
Chrony Ubuntu jammy *
Chrony Ubuntu kinetic *
Chrony Ubuntu lunar *
Chrony Ubuntu mantic *
Chrony Ubuntu noble *
Chrony Ubuntu oracular *
Chrony Ubuntu trusty *
Chrony Ubuntu trusty/esm *
Chrony Ubuntu upstream *
Chrony Ubuntu xenial *

Potential Mitigations

  • Follow the principle of least privilege when assigning access rights to entities in a software system.
  • Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

References