CVE-2020-36770

CVSS 3.1 Score 9.8 of 10 (high)

Details

Published Jan 15, 2024
Updated: Jan 22, 2024

Summary

The vulnerability with the CVE ID name CVE-2020-36770 affects the Gentoo ebuild for Slurm through version 22.05.3. It allows the slurm user to become the owner of root-owned files by exploiting the pkg_postinst function, which unnecessarily assigns root's ownership to files in the live root filesystem using chown. This vulnerability has a base severity rating of CRITICAL with a base score of 9.8 according to [email protected]. The exploitability score is 3.9, and it requires no privileges or user interaction. The attack vector is through the network, and it has a high impact on both integrity and confidentiality. The vulnerability poses a significant danger to organizations that use Slurm, as it can lead to unauthorized access and manipulation of critical system files by non-privileged users.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2020-36770 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions