Suse Supportutils vulnerabilities

5 known vulnerabilities affecting suse/supportutils.

Total CVEs
5
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH1MEDIUM2LOW2

Vulnerabilities

Page 1 of 1
CVE-2018-19636HIGHCVSS 7.8≥ unspecified, < 3.1-5.7.12019-03-05
CVE-2018-19636 [HIGH] CWE-306 CVE-2018-19636: Supportutils, before version 3.1-5.7.1, when run with command line argument -A searched the file sys Supportutils, before version 3.1-5.7.1, when run with command line argument -A searched the file system for a ndspath binary. If an attacker provides one at an arbitrary location it is executed with root privileges
cvelistv5nvd
CVE-2018-19638MEDIUMCVSS 4.7≥ unspecified, < 3.1-5.7.12019-03-05
CVE-2018-19638 [LOW] CWE-377 CVE-2018-19638: In supportutils, before version 3.1-5.7.1 and if pacemaker is installed on the system, an unprivileg In supportutils, before version 3.1-5.7.1 and if pacemaker is installed on the system, an unprivileged user could have overwritten arbitrary files in the directory that is used by supportutils to collect the log files.
cvelistv5nvd
CVE-2018-19637MEDIUMCVSS 5.5≥ unspecified, < 3.1-5.7.12019-03-05
CVE-2018-19637 [LOW] CWE-377 CVE-2018-19637: Supportutils, before version 3.1-5.7.1, wrote data to static file /tmp/supp_log, allowing local atta Supportutils, before version 3.1-5.7.1, wrote data to static file /tmp/supp_log, allowing local attackers to overwrite files on systems without symlink protection
cvelistv5nvd
CVE-2018-19640LOWCVSS 2.2≥ unspecified, < 3.1-5.7.12019-03-05
CVE-2018-19640 [LOW] CWE-377 Code execution if run with command line switch -v Code execution if run with command line switch -v If the attacker manages to create files in the directory used to collect log files in supportutils before version 3.1-5.7.1 (e.g. with CVE-2018-19638) he can kill arbitrary processes on the local machine.
cvelistv5
CVE-2018-19639LOWCVSS 2.2≥ unspecified, < 3.1-5.7.12019-03-05
CVE-2018-19639 [LOW] CWE-78 Code execution if run with command line switch -v Code execution if run with command line switch -v If supportutils before version 3.1-5.7.1 is run with -v to perform rpm verification and the attacker manages to manipulate the rpm listing (e.g. with CVE-2018-19638) he can execute arbitrary commands as root.
cvelistv5