Vulnerability Name: | CVE-2020-24330 (CCN-186762) | ||||||||||||||||||||||||
Assigned: | 2020-06-08 | ||||||||||||||||||||||||
Published: | 2020-06-08 | ||||||||||||||||||||||||
Updated: | 2022-04-28 | ||||||||||||||||||||||||
Summary: | An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges instead of by the tss user, it fails to drop the root gid privilege when no longer needed. | ||||||||||||||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.9 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
6.9 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
6.9 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
| ||||||||||||||||||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||||||||||||||||||
Vulnerability Type: | CWE-269 CWE-271 | ||||||||||||||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-24330 Source: MLIST Type: Exploit, Mailing List, Third Party Advisory [oss-security] 20200814 Re: [TrouSerS-tech] Multiple Security Issues in the TrouSerS tpm1.2 tscd Daemon Source: CCN Type: Bugzilla - Bug 1164472 VUL-0: trousers: TrouSerS tcsd privilege escalation tss to root user Source: MISC Type: Exploit, Issue Tracking, Third Party Advisory https://bugzilla.suse.com/show_bug.cgi?id=1164472 Source: XF Type: UNKNOWN trousers-cve202024330-priv-esc(186762) Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2020-ab3dace708 Source: MISC Type: Mailing List, Patch, Third Party Advisory https://seclists.org/oss-sec/2020/q2/att-135/tcsd_fixes.patch Source: MISC Type: Exploit, Mailing List, Third Party Advisory https://sourceforge.net/p/trousers/mailman/message/37015817/ Source: CCN Type: SourceForge TrouSerS Project Web site TrouSerS Source: CCN Type: IBM Security Bulletin 6493729 (Cloud Pak for Security) Cloud Pak for Security is vulnerable to several CVEs | ||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||
| |||||||||||||||||||||||||
BACK |