arpwatch: Local privilege escalation from runtime user to root

CVE-2021-25321
7.8HIGH

Key Information

Vendor
Suse
Status
Suse Linux Enterprise Server 11-sp4-ltss
Suse Manager Server 4.0
Suse Openstack Cloud Crowbar 9
Factory
Vendor
CVE Published:
28 June 2021

Summary

A UNIX Symbolic Link (Symlink) Following vulnerability in arpwatch of SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Manager Server 4.0, SUSE OpenStack Cloud Crowbar 9; openSUSE Factory, Leap 15.2 allows local attackers with control of the runtime user to run arpwatch as to escalate to root upon the next restart of arpwatch. This issue affects: SUSE Linux Enterprise Server 11-SP4-LTSS arpwatch versions prior to 2.1a15. SUSE Manager Server 4.0 arpwatch versions prior to 2.1a15. SUSE OpenStack Cloud Crowbar 9 arpwatch versions prior to 2.1a15. openSUSE Factory arpwatch version 2.1a15-169.5 and prior versions. openSUSE Leap 15.2 arpwatch version 2.1a15-lp152.5.5 and prior versions.

Affected Version(s)

SUSE Linux Enterprise Server 11-SP4-LTSS < 2.1a15

SUSE Manager Server 4.0 < 2.1a15

SUSE OpenStack Cloud Crowbar 9 < 2.1a15

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database

Credit

Johannes Segitz of SUSE
.