Privilege escalation in TrouSerS



Published: 2022-08-13
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2020-24330
CWE-ID CWE-269
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
TrouSerS
Client/Desktop applications / Software for system administration

Vendor TrouSerS

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Improper Privilege Management

EUVDB-ID: #VU66471

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2020-24330

CWE-ID: CWE-269 - Improper Privilege Management

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges.

The vulnerability exists due to the tcsd daemon is started with root privileges instead of tss user and fails to drop them after successful start. A local user can abuse such behavior and escalate privileges on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

TrouSerS: 0.2.8 - 0.3.14


CPE2.3 External links

http://bugzilla.suse.com/show_bug.cgi?id=1164472
http://sourceforge.net/p/trousers/mailman/message/37015817/
http://seclists.org/oss-sec/2020/q2/att-135/tcsd_fixes.patch
http://www.openwall.com/lists/oss-security/2020/08/14/1
http://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SSDL7COIFCZQMUBNAASNMKMX7W5JUHRD/

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###