Podatność CVE-2020-5202


Publikacja: 2020-01-21

Opis:
apt-cacher-ng through 3.3 allows local users to obtain sensitive information by hijacking the hardcoded TCP port. The /usr/lib/apt-cacher-ng/acngtool program attempts to connect to apt-cacher-ng via TCP on localhost port 3142, even if the explicit SocketPath=/var/run/apt-cacher-ng/socket command-line option is passed. The cron job /etc/cron.daily/apt-cacher-ng (which is active by default) attempts this periodically. Because 3142 is an unprivileged port, any local user can try to bind to this port and will receive requests from acngtool. There can be sensitive data in these requests, e.g., if AdminAuth is enabled in /etc/apt-cacher-ng/security.conf. This sensitive data can leak to unprivileged local users that manage to bind to this port before the apt-cacher-ng daemon can.

Typ:

CWE-200

(Information Exposure)

CVSS2 => (AV:L/AC:L/Au:N/C:P/I:N/A:N)

Ogólna skala CVSS
Znaczenie
Łatwość wykorzystania
2.1/10
2.9/10
3.9/10
Wymagany dostęp
Złożoność ataku
Autoryzacja
Lokalny
Niska
Nie wymagana
Wpływ na poufność
Wpływ na integralność
Wpływ na dostępność
Częściowy
Brak
Brak
Affected software
Debian -> Debian linux 
Apt-cacher-ng project -> Apt-cacher-ng 

 Referencje:
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00065.html
http://www.openwall.com/lists/oss-security/2020/01/20/4
https://seclists.org/oss-sec/2020/q1/21
https://security-tracker.debian.org/tracker/CVE-2020-5202

Copyright 2024, cxsecurity.com

 

Back to Top