apt-cacher-ngproject apt-cacher-ng CVE-2020-5202 vulnerability in Apt Cacher Ngproject and Other Products
Published on January 21, 2020

product logo product logo product logo
apt-cacher-ng through 3.3 allows local users to obtain sensitive information by hijacking the hardcoded TCP port. The /usr/lib/apt-cacher-ng/acngtool program attempts to connect to apt-cacher-ng via TCP on localhost port 3142, even if the explicit SocketPath=/var/run/apt-cacher-ng/socket command-line option is passed. The cron job /etc/cron.daily/apt-cacher-ng (which is active by default) attempts this periodically. Because 3142 is an unprivileged port, any local user can try to bind to this port and will receive requests from acngtool. There can be sensitive data in these requests, e.g., if AdminAuth is enabled in /etc/apt-cacher-ng/security.conf. This sensitive data can leak to unprivileged local users that manage to bind to this port before the apt-cacher-ng daemon can.

Vendor Advisory Vendor Advisory NVD


Products Associated with CVE-2020-5202

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2020-5202 are published in these products:

 
 
 
 

Exploit Probability

EPSS
0.07%
Percentile
21.64%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.