CVE-2018-4052
An exploitable local information leak vulnerability exists in the privileged helper tool of GOG Galaxy’s Games, version 1.2.47 for macOS. An attacker can pass a PID and receive information running on it that would usually only be accessible to the root user.
Gog Galaxy 1.2.47 (macOS)
6.2 - CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CWE-19: Improper Input Validation
GOG Galaxy is a platform that allows users to launch, update and manage video games. By default, GOG Galaxy installs a helper tool service with root privileges. This tool listens for connections and uses the provided protocol to dispatch functionality out.
The vulnerability arises in the fillProcessInformationForPids
. This function takes an array of process id’s and fills in a process structure based on the information returned. The function uses proc_pidinfo
to gather this information. Traditionally, a user should only be able to access information about processes running with the same privilege. This information is then passed back to the caller via objective-c closures. If an attacker passes in values of root processes, sensitive information is returned, creating an information disclosure vulnerability.
2018-11-20 - Vendor Disclosure
2018-12-14 - Vendor Patched
2019-03-26 - Public Release
Discovered by Tyler Bohan of Cisco Talos.