ALAS-2020-1419

Related Vulnerabilities: CVE-2019-13033   CVE-2020-13882  

In CISOfy Lynis 2.x through 2.7.5, the license key can be obtained by looking at the process list when a data upload is being performed. This license can be used to upload data to a central Lynis server. Although no data can be extracted by knowing the license key, it may be possible to upload the data of additional scans. (CVE-2019-13033) For additional information:<a href="https://nvd.nist.gov/vuln/detail/cve-2019-13033">https://nvd.nist.gov/vuln/detail/cve-2019-13033</a> CISOfy Lynis before 3.0.0 has Incorrect Access Control because of a TOCTOU race condition. The routine to check the log and report file permissions was not working as intended and could be bypassed locally. Because of the race, an unprivileged attacker can set up a log and report file, and control that up to the point where the specific routine is doing its check. After that, the file can be removed, recreated, and used for additional attacks. (CVE-2020-13882) For additional information:<a href="https://nvd.nist.gov/vuln/detail/cve-2020-13882">https://nvd.nist.gov/vuln/detail/cve-2020-13882</a>

ALAS-2020-1419


Amazon Linux AMI Security Advisory: ALAS-2020-1419
Advisory Release Date: 2020-08-26 23:09 Pacific
Advisory Updated Date: 2020-08-31 20:08 Pacific
Severity: Medium

Issue Overview:

In CISOfy Lynis 2.x through 2.7.5, the license key can be obtained by looking at the process list when a data upload is being performed. This license can be used to upload data to a central Lynis server. Although no data can be extracted by knowing the license key, it may be possible to upload the data of additional scans. (CVE-2019-13033)
For additional information:
<a href="https://nvd.nist.gov/vuln/detail/cve-2019-13033">https://nvd.nist.gov/vuln/detail/cve-2019-13033</a>


CISOfy Lynis before 3.0.0 has Incorrect Access Control because of a TOCTOU race condition. The routine to check the log and report file permissions was not working as intended and could be bypassed locally. Because of the race, an unprivileged attacker can set up a log and report file, and control that up to the point where the specific routine is doing its check. After that, the file can be removed, recreated, and used for additional attacks. (CVE-2020-13882)
For additional information:
<a href="https://nvd.nist.gov/vuln/detail/cve-2020-13882">https://nvd.nist.gov/vuln/detail/cve-2020-13882</a>


Affected Packages:

lynis


Issue Correction:
Run yum update lynis to update your system.

New Packages:
noarch:
    lynis-3.0.0-1.17.amzn1.noarch

src:
    lynis-3.0.0-1.17.amzn1.src