First published: Tue Nov 26 2019(Updated: )
A symlink following vulnerability in the packaging of mailman in SUSE Linux Enterprise Server 11, SUSE Linux Enterprise Server 12; openSUSE Leap 15.1 allowed local attackers to escalate their privileges from user wwwrun to root. Additionally arbitrary files could be changed to group mailman. This issue affects: SUSE Linux Enterprise Server 11 mailman versions prior to 2.1.15-9.6.15.1. SUSE Linux Enterprise Server 12 mailman versions prior to 2.1.17-3.11.1. openSUSE Leap 15.1 mailman version 2.1.29-lp151.2.14 and prior versions.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
Suse Mailman | <2.1.15-9.6.15.1 | |
SUSE Linux Enterprise Server | =11 | |
Suse Mailman | <2.1.17-3.11.1 | |
SUSE Linux Enterprise Server | =12 | |
Suse Mailman | <=2.1.29-lp151.2.14 | |
openSUSE Leap | =15.1 | |
openSUSE Backports SLE | =15.0-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3693 is a symlink following vulnerability in the packaging of mailman in SUSE Linux Enterprise Server 11, SUSE Linux Enterprise Server 12, and openSUSE Leap 15.1, which allows local attackers to escalate their privileges from user wwwrun to root.
The affected software versions are Suse Mailman 2.1.15-9.6.15.1, Suse Mailman 2.1.17-3.11.1, and Suse Mailman 2.1.29-lp151.2.14.
CVE-2019-3693 has a severity score of 7.8, which is classified as high severity.
To fix CVE-2019-3693, it is recommended to update the affected software versions to the latest patches or versions provided by the vendor.
You can find more information about CVE-2019-3693 at the following references: [1] [2] [3].