Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-12522

Опубликовано: 15 апр. 2020
Источник: debian
EPSS Низкий

Описание

An issue was discovered in Squid through 4.7. When Squid is run as root, it spawns its child processes as a lesser user, by default the user nobody. This is done via the leave_suid call. leave_suid leaves the Saved UID as 0. This makes it trivial for an attacker who has compromised the child process to escalate their privileges back to root.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
squidunfixedpackage
squid3removedpackage

Примечания

  • Only causes problems if some other vulnerability is used to compromise the proxy.

  • There is no upstream plan to fix the issue. The issue here is that some child

  • processes run as low-privilege but stay in a state where they can resume root

  • privileges. That is needed for reconfigure still. Architectural changes are needed

  • to resolve it without breaking some installations.

EPSS

Процентиль: 40%
0.0018
Низкий

Связанные уязвимости

CVSS3: 4.5
ubuntu
почти 6 лет назад

An issue was discovered in Squid through 4.7. When Squid is run as root, it spawns its child processes as a lesser user, by default the user nobody. This is done via the leave_suid call. leave_suid leaves the Saved UID as 0. This makes it trivial for an attacker who has compromised the child process to escalate their privileges back to root.

CVSS3: 4.5
redhat
почти 6 лет назад

An issue was discovered in Squid through 4.7. When Squid is run as root, it spawns its child processes as a lesser user, by default the user nobody. This is done via the leave_suid call. leave_suid leaves the Saved UID as 0. This makes it trivial for an attacker who has compromised the child process to escalate their privileges back to root.

CVSS3: 4.5
nvd
почти 6 лет назад

An issue was discovered in Squid through 4.7. When Squid is run as root, it spawns its child processes as a lesser user, by default the user nobody. This is done via the leave_suid call. leave_suid leaves the Saved UID as 0. This makes it trivial for an attacker who has compromised the child process to escalate their privileges back to root.

github
больше 3 лет назад

An issue was discovered in Squid through 4.7. When Squid is run as root, it spawns its child processes as a lesser user, by default the user nobody. This is done via the leave_suid call. leave_suid leaves the Saved UID as 0. This makes it trivial for an attacker who has compromised the child process to escalate their privileges back to root.

EPSS

Процентиль: 40%
0.0018
Низкий