SB2024051429 - SUSE update for SUSE Manager Client Tools Beta
Published: May 14, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Symlink attack (CVE-ID: CVE-2016-9566)
The vulnerability allows a local user obtain elevated privileges on vulnerable system.
The vulnerability exists due to the application handles log files in unsafe manner. A local user with access to Nagios application (nagios account or member of nagios group) can cerate a specially crafted symlink to nagios log file and execute arbitrary command on vulnerable system with root privileges.
Successful exploitation of this vulnerability may allow a local user to obtain full access to vulnerable system.
2) UNIX symbolic link following (CVE-ID: CVE-2019-3698)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a symlink following issue in the cronjob shipped with nagios. A local user can create a specially crafted symbolic link to a critical file on the system and overwrite it with privileges of the application.
Successful exploitation of this vulnerability may result in privilege escalation.
Remediation
Install update from vendor's website.