First published: Fri Mar 15 2019(Updated: )
In yast2-samba-provision up to and including version 1.0.1 the password for samba shares was provided on the command line to tools used by yast2-samba-provision, allowing local attackers to read them in the process list
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
openSUSE YaST2 Samba Provision | <=1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-17956 has been classified as a moderate severity vulnerability.
To fix CVE-2018-17956, upgrade yast2-samba-provision to version 1.0.2 or later.
Users of yast2-samba-provision version 1.0.1 and earlier on OpenSUSE are affected by CVE-2018-17956.
CVE-2018-17956 allows local attackers to read Samba share passwords from the command line in the process list.
CVE-2018-17956 is a local vulnerability, requiring access to the command line of the affected system.