Vulnerability Name: | CVE-2020-24332 (CCN-186764) | ||||||||||||||||||||||||||||
Assigned: | 2020-06-08 | ||||||||||||||||||||||||||||
Published: | 2020-06-08 | ||||||||||||||||||||||||||||
Updated: | 2022-11-18 | ||||||||||||||||||||||||||||
Summary: | An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges, the creation of the system.data file is prone to symlink attacks. The tss user can be used to create or corrupt existing files, which could possibly lead to a DoS attack. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) 4.9 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:U/RC:R)
6.3 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:U/RC:R)
4.9 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:U/RC:R)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.9 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C)
| ||||||||||||||||||||||||||||
Vulnerability Type: | CWE-59 CWE-22 | ||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-24332 Source: MLIST Type: Exploit, Mailing List, Third Party Advisory [oss-security] 20200814 Re: [TrouSerS-tech] Multiple Security Issues in the TrouSerS tpm1.2 tscd Daemon Source: CCN Type: Bugzilla - Bug 1164472 VUL-0: trousers: TrouSerS tcsd privilege escalation tss to root user Source: MISC Type: Exploit, Issue Tracking, Third Party Advisory https://bugzilla.suse.com/show_bug.cgi?id=1164472 Source: XF Type: UNKNOWN trousers-cve202024332-dos(186764) Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2020-ab3dace708 Source: MISC Type: Mailing List, Patch, Third Party Advisory https://seclists.org/oss-sec/2020/q2/att-135/tcsd_fixes.patch Source: MISC Type: Exploit, Mailing List, Mitigation, Third Party Advisory https://sourceforge.net/p/trousers/mailman/message/37015817/ Source: CCN Type: SourceForge TrouSerS Project Web site TrouSerS | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: ![]() | ||||||||||||||||||||||||||||
Vulnerability Name: | CVE-2020-24332 (CCN-186821) | ||||||||||||||||||||||||||||
Assigned: | 2020-02-20 | ||||||||||||||||||||||||||||
Published: | 2020-02-20 | ||||||||||||||||||||||||||||
Updated: | 2020-02-20 | ||||||||||||||||||||||||||||
Summary: | An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges, the creation of the system.data file is prone to symlink attacks. The tss user can be used to create or corrupt existing files, which could possibly lead to a DoS attack. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) 4.9 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:U/RC:R)
7.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
4.9 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:U/RC:R)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.9 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C)
| ||||||||||||||||||||||||||||
Vulnerability Type: | CWE-59 CWE-22 | ||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-24332 Source: CCN Type: Bugzilla - Bug 1164472 Bug 1164472 - (CVE-2020-24330) VUL-0: CVE-2020-24330: trousers: TrouSerS tcsd privilege escalation tss to root user Source: XF Type: UNKNOWN trousers-cve202024332-priv-esc(186821) Source: CCN Type: TrouSerS Web site TrouSerS | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1:![]() | ||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
BACK |