Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-19520

EPSS 2.23% · P85
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2019-19520

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
xlock in OpenBSD 6.6 allows local users to gain the privileges of the auth group by providing a LIBGL_DRIVERS_PATH environment variable, because xenocara/lib/mesa/src/loader/loader.c mishandles dlopen.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
OpenBSD 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
OpenBSD是加拿大OpenBSD项目组的一套跨平台的、基于BSD的类UNIX操作系统。 OpenBSD 6.6版本中的xlock存在安全漏洞,该漏洞源于xenocara/lib/mesa/src/loader/loader.c文件没有正确处理dlopen。本地攻击者可通过提交LIBGL_DRIVERS_PATH环境变量利用该漏洞获取‘auth’组的权限。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2019-19520

#POC DescriptionSource LinkShenlong Link
1Script that automates the process of escalating privileges on openbsd system (CVE-2019-19520) by exploiting the xlock binary and againing it's sgid and escalating to the root user by (CVE-2019-19522) exploiting the privileges of auth group and adding keys to the Skey or Yubikeyhttps://github.com/retrymp3/Openbsd-Privilege-EscalationPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2019-19520

登录查看更多情报信息。

Same Patch Batch · n/a · 2019-12-04 · 26 CVEs total

CVE-2019-19364Sony Catalyst Production Suite和Catalyst Browse 代码问题漏洞
CVE-2019-18850TrevorC2 信息泄露漏洞
CVE-2019-14909Red Hat Keycloak 授权问题漏洞
CVE-2019-15638COPA-DATA zenone32 zenon Editor 代码问题漏洞
CVE-2019-19555Xfig fig2dev 缓冲区错误漏洞
CVE-2018-0728Helpdesk 访问控制错误漏洞
CVE-2018-0729QNAP Systems QNAP Music Station 注入漏洞
CVE-2018-0730QNAP Systems QNAP QTS File Station 注入漏洞
CVE-2019-7201QNAP Systems QNAP NetBak Replicator 代码问题漏洞
CVE-2019-7197QNAP Systems QNAP QTS 跨站脚本漏洞
CVE-2019-18346DAViCal 跨站请求伪造漏洞
CVE-2019-18347DAViCal 跨站脚本漏洞
CVE-2019-19576verot.net class.upload 代码问题漏洞
CVE-2019-19587WSO2 Enterprise Integrator 跨站脚本漏洞
CVE-2019-19229Fronius Solar Inverter 路径遍历漏洞
CVE-2019-19228Fronius Solar Inverter 安全漏洞
CVE-2019-19133WordPress CSS Hero 跨站脚本漏洞
CVE-2019-16753Decentralized Anonymous Payment System 数据伪造问题漏洞
CVE-2019-16752Decentralized Anonymous Payment System 跨站请求伪造漏洞
CVE-2019-11216BMC Smart Reporting 代码问题漏洞

Showing top 20 of 26 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2019-19520

No comments yet


Leave a comment