First published: Tue May 15 2018(Updated: )
The /usr/sbin/pinger binary packaged with squid in SUSE Linux Enterprise Server 15 before and including version 4.8-5.8.1 and in SUSE Linux Enterprise Server 12 before and including 3.5.21-26.17.1 had squid:root, 0750 permissions. This allowed an attacker that compromissed the squid user to gain persistence by changing the binary
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux Enterprise Server | =12-sp1 | |
SUSE Linux Enterprise Server | =12-sp2 | |
SUSE Linux Enterprise Server | =12-sp3 | |
SUSE Linux Enterprise Server | =15 | |
SUSE Linux Enterprise Server | =15-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3688 is a vulnerability in the /usr/sbin/pinger binary packaged with squid in SUSE Linux Enterprise Server.
CVE-2019-3688 has a severity rating of 7.1 (high).
To exploit CVE-2019-3688, an attacker would need to compromise the squid user.
To fix CVE-2019-3688, update to a version of SUSE Linux Enterprise Server that includes the patch.
You can find more information about CVE-2019-3688 in the references provided: [Link 1](http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html), [Link 2](http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html), [Link 3](http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00024.html).