Opensuse

Supportutils

6 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.01%
  • Veröffentlicht 15.02.2023 10:15:17
  • Zuletzt bearbeitet 21.11.2024 07:28:51

A Cleartext Storage of Sensitive Information vulnerability in suppportutils of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15, SUSE Linux Enterprise Server 15 SP3 allows attackers that get access to the support logs to gain knowledg...

  • EPSS 0.04%
  • Veröffentlicht 05.03.2019 16:29:00
  • Zuletzt bearbeitet 21.11.2024 03:58:19

Supportutils, before version 3.1-5.7.1, when run with command line argument -A searched the file system for a ndspath binary. If an attacker provides one at an arbitrary location it is executed with root privileges

  • EPSS 0.04%
  • Veröffentlicht 05.03.2019 16:29:00
  • Zuletzt bearbeitet 21.11.2024 03:58:19

Supportutils, before version 3.1-5.7.1, wrote data to static file /tmp/supp_log, allowing local attackers to overwrite files on systems without symlink protection

  • EPSS 0.04%
  • Veröffentlicht 05.03.2019 16:29:00
  • Zuletzt bearbeitet 21.11.2024 03:58:19

In supportutils, before version 3.1-5.7.1 and if pacemaker is installed on the system, an unprivileged user could have overwritten arbitrary files in the directory that is used by supportutils to collect the log files.

  • EPSS 0.19%
  • Veröffentlicht 05.03.2019 16:29:00
  • Zuletzt bearbeitet 21.11.2024 03:58:20

If supportutils before version 3.1-5.7.1 is run with -v to perform rpm verification and the attacker manages to manipulate the rpm listing (e.g. with CVE-2018-19638) he can execute arbitrary commands as root.

  • EPSS 0.05%
  • Veröffentlicht 05.03.2019 16:29:00
  • Zuletzt bearbeitet 21.11.2024 03:58:20

If the attacker manages to create files in the directory used to collect log files in supportutils before version 3.1-5.7.1 (e.g. with CVE-2018-19638) he can kill arbitrary processes on the local machine.