CVE-2020-5202 — Sensitive Information Exposure in Project Apt-cacher-ng
Severity
5.5MEDIUMNVD
EPSS
0.1%
top 78.33%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 21
Latest updateMay 24
Description
apt-cacher-ng through 3.3 allows local users to obtain sensitive information by hijacking the hardcoded TCP port. The /usr/lib/apt-cacher-ng/acngtool program attempts to connect to apt-cacher-ng via TCP on localhost port 3142, even if the explicit SocketPath=/var/run/apt-cacher-ng/socket command-line option is passed. The cron job /etc/cron.daily/apt-cacher-ng (which is active by default) attempts this periodically. Because 3142 is an unprivileged port, any local user can try to bind to this por…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6
Affected Packages4 packages
Also affects: Debian Linux 10.0, 8.0, 9.0
Patches
🔴Vulnerability Details
3📋Vendor Advisories
1Debian▶
CVE-2020-5202: apt-cacher-ng - apt-cacher-ng through 3.3 allows local users to obtain sensitive information by ...↗2020
💬Community
3Bugzilla▶
CVE-2020-5202 apt-cacher-ng: local unprivileged user can impersonate the apt-cacher-ng daemon leading to credentials leak↗2020-03-16
Bugzilla▶
CVE-2020-5202 apt-cacher-ng: local unprivileged user can impersonate the apt-cacher-ng daemon leading to credentials leak [fedora-all]↗2020-03-16
Bugzilla▶
CVE-2020-5202 apt-cacher-ng: local unprivileged user can impersonate the apt-cacher-ng daemon leading to credentials leak [epel-7]↗2020-03-16