Local privilege escalation from user wwwrun to root in the packaging of mailman

CVE-2019-3693
7.7HIGH

Key Information

Vendor
Suse
Status
Suse Linux Enterprise Server 11
Suse Linux Enterprise Server 12
Leap 15.1
Vendor
CVE Published:
24 January 2020

Summary

A symlink following vulnerability in the packaging of mailman in SUSE Linux Enterprise Server 11, SUSE Linux Enterprise Server 12; openSUSE Leap 15.1 allowed local attackers to escalate their privileges from user wwwrun to root. Additionally arbitrary files could be changed to group mailman. This issue affects: SUSE Linux Enterprise Server 11 mailman versions prior to 2.1.15-9.6.15.1. SUSE Linux Enterprise Server 12 mailman versions prior to 2.1.17-3.11.1. openSUSE Leap 15.1 mailman version 2.1.29-lp151.2.14 and prior versions.

Affected Version(s)

SUSE Linux Enterprise Server 11 < 2.1.15-9.6.15.1

SUSE Linux Enterprise Server 12 < 2.1.17-3.11.1

Leap 15.1 <= 2.1.29-lp151.2.14

CVSS V3.1

Score:
7.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Risk change from: 7.8 to: 7.7 - (HIGH)

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database

Credit

Johannes Segitz of SUSE
.