Lucene search

K
gentooGentoo FoundationGLSA-201908-15
HistoryAug 15, 2019 - 12:00 a.m.

ZNC: Privilege escalation

2019-08-1500:00:00
Gentoo Foundation
security.gentoo.org
9

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.01 Low

EPSS

Percentile

83.6%

Background

ZNC is an advanced IRC bouncer.

Description

It was discovered that ZNC’s “Modules.cpp” allows remote authenticated non-admin users to escalate privileges.

Impact

A remote authenticated attacker could escalate privileges and subsequently execute arbitrary code or conduct a Denial of Service attack.

Workaround

There is no known workaround at this time.

Resolution

All ZNC users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-irc/znc-1.7.4_rc1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-irc/znc< 1.7.4_rc1UNKNOWN

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.01 Low

EPSS

Percentile

83.6%