Vulnerabilities > CVE-2019-19520 - Incorrect Authorization vulnerability in Openbsd 6.6
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
xlock in OpenBSD 6.6 allows local users to gain the privileges of the auth group by providing a LIBGL_DRIVERS_PATH environment variable, because xenocara/lib/mesa/src/loader/loader.c mishandles dlopen.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 1 |
Common Weakness Enumeration (CWE)
Packetstorm
data source | https://packetstormsecurity.com/files/download/155572/qsa-openbsd.txt |
id | PACKETSTORM:155572 |
last seen | 2019-12-06 |
published | 2019-12-05 |
reporter | qualys.com |
source | https://packetstormsecurity.com/files/155572/Qualys-Security-Advisory-OpenBSD-Authentication-Bypass-Privilege-Escalation.html |
title | Qualys Security Advisory - OpenBSD Authentication Bypass / Privilege Escalation |
The Hacker News
id | THN:46888CC4F1109D706C6033E851E731A9 |
last seen | 2019-12-05 |
modified | 2019-12-05 |
published | 2019-12-05 |
reporter | The Hacker News |
source | https://thehackernews.com/2019/12/openbsd-authentication-vulnerability.html |
title | Severe Auth Bypass and Priv-Esc Vulnerabilities Disclosed in OpenBSD |
References
- http://packetstormsecurity.com/files/155572/Qualys-Security-Advisory-OpenBSD-Authentication-Bypass-Privilege-Escalation.html
- http://seclists.org/fulldisclosure/2019/Dec/14
- http://www.openwall.com/lists/oss-security/2019/12/04/5
- http://www.openwall.com/lists/oss-security/2019/12/04/6
- https://seclists.org/bugtraq/2019/Dec/8
- https://www.openbsd.org/errata66.html
- https://www.openwall.com/lists/oss-security/2019/12/04/5