7.8
CWE
59
Advisory Published
Updated

CVE-2019-3693: Local privilege escalation from user wwwrun to root in the packaging of mailman

First published: Tue Nov 26 2019(Updated: )

A symlink following vulnerability in the packaging of mailman in SUSE Linux Enterprise Server 11, SUSE Linux Enterprise Server 12; openSUSE Leap 15.1 allowed local attackers to escalate their privileges from user wwwrun to root. Additionally arbitrary files could be changed to group mailman. This issue affects: SUSE Linux Enterprise Server 11 mailman versions prior to 2.1.15-9.6.15.1. SUSE Linux Enterprise Server 12 mailman versions prior to 2.1.17-3.11.1. openSUSE Leap 15.1 mailman version 2.1.29-lp151.2.14 and prior versions.

Credit: meissner@suse.de

Affected SoftwareAffected VersionHow to fix
Suse Mailman<2.1.15-9.6.15.1
SUSE Linux Enterprise Server=11
Suse Mailman<2.1.17-3.11.1
SUSE Linux Enterprise Server=12
Suse Mailman<=2.1.29-lp151.2.14
openSUSE Leap=15.1
openSUSE Backports SLE=15.0-sp1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2019-3693?

    CVE-2019-3693 is a symlink following vulnerability in the packaging of mailman in SUSE Linux Enterprise Server 11, SUSE Linux Enterprise Server 12, and openSUSE Leap 15.1, which allows local attackers to escalate their privileges from user wwwrun to root.

  • Which software versions are affected by CVE-2019-3693?

    The affected software versions are Suse Mailman 2.1.15-9.6.15.1, Suse Mailman 2.1.17-3.11.1, and Suse Mailman 2.1.29-lp151.2.14.

  • How severe is CVE-2019-3693?

    CVE-2019-3693 has a severity score of 7.8, which is classified as high severity.

  • How can I fix CVE-2019-3693?

    To fix CVE-2019-3693, it is recommended to update the affected software versions to the latest patches or versions provided by the vendor.

  • Where can I find more information about CVE-2019-3693?

    You can find more information about CVE-2019-3693 at the following references: [1] [2] [3].

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203