Show filters
5 Total Results
Displaying 1-5 of 5
Sort by:
Attacker Value
Unknown
CVE-2020-24330
Disclosure Date: August 13, 2020 (last updated February 21, 2025)
An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges instead of by the tss user, it fails to drop the root gid privilege when no longer needed.
0
Attacker Value
Unknown
CVE-2020-24331
Disclosure Date: August 13, 2020 (last updated February 21, 2025)
An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges, the tss user still has read and write access to the /etc/tcsd.conf file (which contains various settings related to this daemon).
0
Attacker Value
Unknown
CVE-2020-24332
Disclosure Date: August 13, 2020 (last updated February 21, 2025)
An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges, the creation of the system.data file is prone to symlink attacks. The tss user can be used to create or corrupt existing files, which could possibly lead to a DoS attack.
0
Attacker Value
Unknown
trousers: Local privilege escalation from tss to root
Disclosure Date: January 23, 2020 (last updated February 21, 2025)
UNIX Symbolic Link (Symlink) Following vulnerability in the trousers package of SUSE Linux Enterprise Server 15 SP1; openSUSE Factory allowed local attackers escalate privileges from user tss to root. This issue affects: SUSE Linux Enterprise Server 15 SP1 trousers versions prior to 0.3.14-6.3.1. openSUSE Factory trousers versions prior to 0.3.14-7.1.
0
Attacker Value
Unknown
CVE-2012-0698
Disclosure Date: November 26, 2012 (last updated October 05, 2023)
tcsd in TrouSerS before 0.3.10 allows remote attackers to cause a denial of service (daemon crash) via a crafted type_offset value in a TCP packet to port 30003.
0