Information Exposure Affecting apt-cacher-ng package, versions <3.3.1-1


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.05% (21st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN12-APTCACHERNG-1541489
  • published8 Jan 2020
  • disclosed21 Jan 2020

Introduced: 8 Jan 2020

CVE-2020-5202  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade Debian:12 apt-cacher-ng to version 3.3.1-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream apt-cacher-ng package and not the apt-cacher-ng package as distributed by Debian. See How to fix? for Debian:12 relevant fixed versions and status.

apt-cacher-ng through 3.3 allows local users to obtain sensitive information by hijacking the hardcoded TCP port. The /usr/lib/apt-cacher-ng/acngtool program attempts to connect to apt-cacher-ng via TCP on localhost port 3142, even if the explicit SocketPath=/var/run/apt-cacher-ng/socket command-line option is passed. The cron job /etc/cron.daily/apt-cacher-ng (which is active by default) attempts this periodically. Because 3142 is an unprivileged port, any local user can try to bind to this port and will receive requests from acngtool. There can be sensitive data in these requests, e.g., if AdminAuth is enabled in /etc/apt-cacher-ng/security.conf. This sensitive data can leak to unprivileged local users that manage to bind to this port before the apt-cacher-ng daemon can.

CVSS Base Scores

version 3.1