SB2020061809 - Multiple vulnerabilities in HashiCorp Consul and Consul Enterprise



SB2020061809 - Multiple vulnerabilities in HashiCorp Consul and Consul Enterprise

Published: June 18, 2020 Updated: June 18, 2020

Security Bulletin ID SB2020061809
Severity
Medium
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-13170)

The vulnerability allows a remote attacker to escalate privileges on the system.

The vulnerability exists due to the affected software does not appropriately enforce scope for local tokens issued by a primary data center, where replication to a secondary data center was not enabled., which leads to security restrictions bypass and privilege escalation.


2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-12797)

The vulnerability allows a remote attacker to escalate privileges on the system.

The vulnerability exists due to the affected software fails to enforce changes to legacy ACL token rules due to non-propagation to secondary data centers, which leads to security restrictions bypass and privilege escalation.


3) Improper Resource Shutdown or Release (CVE-ID: CVE-2020-12758)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack. 

The vulnerability exists due to the affected can software crash when configured with an abnormally-formed service-router entry. A remote attacker can cause a denial of service condition on the targeted system. 


4) Buffer overflow (CVE-ID: CVE-2020-13250)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in HTTP API and DNS caching feature. A remote attacker can trigger memory corruption and cause a denial of service condition on the target system.



Remediation

Install update from vendor's website.