Vulnerability CVE-2020-5202


Published: 2020-01-21

Description:
apt-cacher-ng through 3.3 allows local users to obtain sensitive information by hijacking the hardcoded TCP port. The /usr/lib/apt-cacher-ng/acngtool program attempts to connect to apt-cacher-ng via TCP on localhost port 3142, even if the explicit SocketPath=/var/run/apt-cacher-ng/socket command-line option is passed. The cron job /etc/cron.daily/apt-cacher-ng (which is active by default) attempts this periodically. Because 3142 is an unprivileged port, any local user can try to bind to this port and will receive requests from acngtool. There can be sensitive data in these requests, e.g., if AdminAuth is enabled in /etc/apt-cacher-ng/security.conf. This sensitive data can leak to unprivileged local users that manage to bind to this port before the apt-cacher-ng daemon can.

Type:

CWE-200

(Information Exposure)

CVSS2 => (AV:L/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
2.1/10
2.9/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Debian -> Debian linux 
Apt-cacher-ng project -> Apt-cacher-ng 

 References:
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00065.html
http://www.openwall.com/lists/oss-security/2020/01/20/4
https://seclists.org/oss-sec/2020/q1/21
https://security-tracker.debian.org/tracker/CVE-2020-5202

Copyright 2024, cxsecurity.com

 

Back to Top