First published: Thu Mar 23 2017(Updated: )
A code injection in the supportconfig data collection tool in supportutils in SUSE Linux Enterprise Server 12 and 12-SP1 and SUSE Linux Enterprise Desktop 12 and 12-SP1 could be used by local attackers to execute code as the user running supportconfig (usually root).
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux Enterprise Desktop with Beagle | =12 | |
SUSE Linux Enterprise Desktop with Beagle | =12-sp1 | |
SUSE Linux Enterprise Server | =12-sp1 | |
SUSE Linux Enterprise Server | =12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1602 is rated as a high severity vulnerability due to the potential for local code execution by attackers.
To mitigate CVE-2016-1602, update the supportutils package to the latest version provided by SUSE.
CVE-2016-1602 affects users running SUSE Linux Enterprise Server and Desktop versions 12 and 12-SP1.
CVE-2016-1602 is a code injection vulnerability in the supportconfig data collection tool.
No, CVE-2016-1602 requires local access, as it can only be exploited by authenticated local users.