CVE-2020-24332

medium

Description

An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges, the creation of the system.data file is prone to symlink attacks. The tss user can be used to create or corrupt existing files, which could possibly lead to a DoS attack.

References

http://www.openwall.com/lists/oss-security/2020/08/14/1

https://bugzilla.suse.com/show_bug.cgi?id=1164472

https://lists.fedoraproject.org/archives/list/[email protected]/message/SSDL7COIFCZQMUBNAASNMKMX7W5JUHRD/

https://seclists.org/oss-sec/2020/q2/att-135/tcsd_fixes.patch

https://sourceforge.net/p/trousers/mailman/message/37015817/

Details

Source: MITRE

Published: 2020-08-13

Updated: 2020-11-05

Type: CWE-59

Risk Information

CVSS v2

Base Score: 4.9

Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Impact Score: 6.9

Exploitability Score: 3.9

Severity: MEDIUM

CVSS v3

Base Score: 5.5

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 1.8

Severity: MEDIUM