Vulnerability Description
log.c in Squid Analysis Report Generator (sarg) through 2.3.11 allows local privilege escalation. By default, it uses a fixed temporary directory /tmp/sarg. As the root user, sarg creates this directory or reuses an existing one in an insecure manner. An attacker can pre-create the directory, and place symlinks in it (after winning a /tmp/sarg/denied.int_unsort race condition). The outcome will be corrupted or newly created files in privileged file system locations.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Squid Analysis Report Generator Project | Squid Analysis Report Generator | <= 2.3.11 |
| Opensuse | Backports Sle | 15.0 |
| Opensuse | Leap | 15.1 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00051.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00063.htmlMailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2020/01/20/6Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2020/01/20/6Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2020/01/27/1Mailing ListThird Party Advisory
- https://bugzilla.suse.com/show_bug.cgi?id=1150554Issue TrackingThird Party Advisory
- https://seclists.org/oss-sec/2020/q1/23Mailing ListThird Party Advisory
- https://security.gentoo.org/glsa/202007-32Third Party Advisory
- https://sourceforge.net/projects/sarg/Third Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00051.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00063.htmlMailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2020/01/20/6Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2020/01/20/6Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2020/01/27/1Mailing ListThird Party Advisory
- https://bugzilla.suse.com/show_bug.cgi?id=1150554Issue TrackingThird Party Advisory
FAQ
What is CVE-2019-18932?
CVE-2019-18932 is a vulnerability with a CVSS score of 7.0 (HIGH). log.c in Squid Analysis Report Generator (sarg) through 2.3.11 allows local privilege escalation. By default, it uses a fixed temporary directory /tmp/sarg. As the root user, sarg creates this directo...
How severe is CVE-2019-18932?
CVE-2019-18932 has been rated HIGH with a CVSS base score of 7.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-18932?
Check the references section above for vendor advisories and patch information. Affected products include: Squid Analysis Report Generator Project Squid Analysis Report Generator, Opensuse Backports Sle, Opensuse Leap.