First published: Tue Nov 15 2016(Updated: )
Vulnerability in Novell Open Enterprise Server (OES2015 SP1 before Scheduled Maintenance Update 10992, OES2015 before Scheduled Maintenance Update 10990, OES11 SP3 before Scheduled Maintenance Update 10991, OES11 SP2 before Scheduled Maintenance Update 10989) might allow authenticated remote attackers to perform unauthorized file access and modification.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Open Enterprise Server | =sp2 | |
SUSE Open Enterprise Server | =sp3 | |
SUSE Open Enterprise Server | ||
SUSE Open Enterprise Server | =sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-5763 is classified as high, as it allows authenticated remote attackers to execute arbitrary code.
To fix CVE-2016-5763, apply the scheduled maintenance updates for your version of Novell Open Enterprise Server.
CVE-2016-5763 affects Novell Open Enterprise Server 2015 SP1, 2015, 11 SP2, and 11 SP3 prior to specific maintenance updates.
No, CVE-2016-5763 requires authentication for exploitation, limiting access to authorized users.
CVE-2016-5763 facilitates remote code execution attacks against vulnerable systems.