Vulnerabilities > CVE-2019-19520 - Incorrect Authorization vulnerability in Openbsd 6.6
Attack vector
LOCAL Attack complexity
LOW Privileges required
LOW Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
xlock in OpenBSD 6.6 allows local users to gain the privileges of the auth group by providing a LIBGL_DRIVERS_PATH environment variable, because xenocara/lib/mesa/src/loader/loader.c mishandles dlopen.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 1 |
Common Weakness Enumeration (CWE)
Packetstorm
data source | https://packetstormsecurity.com/files/download/155572/qsa-openbsd.txt |
id | PACKETSTORM:155572 |
last seen | 2019-12-06 |
published | 2019-12-05 |
reporter | qualys.com |
source | https://packetstormsecurity.com/files/155572/Qualys-Security-Advisory-OpenBSD-Authentication-Bypass-Privilege-Escalation.html |
title | Qualys Security Advisory - OpenBSD Authentication Bypass / Privilege Escalation |
The Hacker News
id | THN:46888CC4F1109D706C6033E851E731A9 |
last seen | 2019-12-05 |
modified | 2019-12-05 |
published | 2019-12-05 |
reporter | The Hacker News |
source | https://thehackernews.com/2019/12/openbsd-authentication-vulnerability.html |
title | Severe Auth Bypass and Priv-Esc Vulnerabilities Disclosed in OpenBSD |
References
- https://www.openbsd.org/errata66.html
- https://www.openwall.com/lists/oss-security/2019/12/04/5
- http://www.openwall.com/lists/oss-security/2019/12/04/6
- http://www.openwall.com/lists/oss-security/2019/12/04/5
- https://seclists.org/bugtraq/2019/Dec/8
- http://packetstormsecurity.com/files/155572/Qualys-Security-Advisory-OpenBSD-Authentication-Bypass-Privilege-Escalation.html
- http://seclists.org/fulldisclosure/2019/Dec/14