
CVE-2020-24330 – trousers: fails to drop the root gid privilege when no longer needed
https://notcve.org/view.php?id=CVE-2020-24330
13 Aug 2020 — An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges instead of by the tss user, it fails to drop the root gid privilege when no longer needed. Se detectó un problema en TrouSerS versiones hasta 0.3.14. Si el demonio tcsd es iniciado con privilegios root en lugar de hacerlo por el usuario tss, se produce un fallo al no poder eliminar el privilegio de root gid cuando ya no es necesario Red Hat Advanced Cluster Management for Kubernetes 2.2.4 images Red Hat Ad... • http://www.openwall.com/lists/oss-security/2020/08/14/1 • CWE-269: Improper Privilege Management CWE-271: Privilege Dropping / Lowering Errors •

CVE-2020-24331 – trousers: tss user still has read and write access to the /etc/tcsd.conf file if tcsd is started as root
https://notcve.org/view.php?id=CVE-2020-24331
13 Aug 2020 — An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges, the tss user still has read and write access to the /etc/tcsd.conf file (which contains various settings related to this daemon). Se detectó un problema en TrouSerS versiones hasta 0.3.14. Si el demonio tcsd es iniciado con privilegios root, el usuario tss aún tiene acceso de lectura y escritura al archivo /etc/tcsd.conf (que contiene varias configuraciones relacionadas con este demonio) Red Hat Advanced ... • http://www.openwall.com/lists/oss-security/2020/08/14/1 • CWE-269: Improper Privilege Management •

CVE-2020-24332 – trousers: tss user can be used to create or corrupt existing files, this could lead to DoS
https://notcve.org/view.php?id=CVE-2020-24332
13 Aug 2020 — An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges, the creation of the system.data file is prone to symlink attacks. The tss user can be used to create or corrupt existing files, which could possibly lead to a DoS attack. Se detectó un problema en TrouSerS versiones hasta 0.3.14. Si el demonio tcsd es iniciado con privilegios root, la creación del archivo system.data es propensa a ataques de tipo symlink. • http://www.openwall.com/lists/oss-security/2020/08/14/1 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2019-18898 – trousers: Local privilege escalation from tss to root
https://notcve.org/view.php?id=CVE-2019-18898
23 Jan 2020 — UNIX Symbolic Link (Symlink) Following vulnerability in the trousers package of SUSE Linux Enterprise Server 15 SP1; openSUSE Factory allowed local attackers escalate privileges from user tss to root. This issue affects: SUSE Linux Enterprise Server 15 SP1 trousers versions prior to 0.3.14-6.3.1. openSUSE Factory trousers versions prior to 0.3.14-7.1. Enlace simbólico de UNIX (Symlink) Siguiendo la vulnerabilidad en el paquete trousers de SUSE Linux Enterprise Server 15 SP1; Los atacantes locales permitidos... • http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00066.html • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2012-0698 – TrouSerS - Denial of Service
https://notcve.org/view.php?id=CVE-2012-0698
26 Nov 2012 — tcsd in TrouSerS before 0.3.10 allows remote attackers to cause a denial of service (daemon crash) via a crafted type_offset value in a TCP packet to port 30003. tcsd en TrouSerS antes de v0.3.10 permite a atacantes remotos provocar una denegación de servicio (caída del demonio) a través de un valor type_offset modificado en un paquete TCP al puerto 30003. A flaw was found in the way tcsd, the daemon that manages Trusted Computing resources, processed incoming TCP packets. A remote attacker could send a spe... • https://www.exploit-db.com/exploits/22904 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •