arpwatch: Local privilege escalation from runtime user to root
CVE-2021-25321
Key Information:
- Vendor
- Suse
- Status
- Vendor
- CVE Published:
- 28 June 2021
Summary
A UNIX Symbolic Link (Symlink) Following vulnerability in arpwatch of SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Manager Server 4.0, SUSE OpenStack Cloud Crowbar 9; openSUSE Factory, Leap 15.2 allows local attackers with control of the runtime user to run arpwatch as to escalate to root upon the next restart of arpwatch. This issue affects: SUSE Linux Enterprise Server 11-SP4-LTSS arpwatch versions prior to 2.1a15. SUSE Manager Server 4.0 arpwatch versions prior to 2.1a15. SUSE OpenStack Cloud Crowbar 9 arpwatch versions prior to 2.1a15. openSUSE Factory arpwatch version 2.1a15-169.5 and prior versions. openSUSE Leap 15.2 arpwatch version 2.1a15-lp152.5.5 and prior versions.
Affected Version(s)
Factory arpwatch <= 2.1a15-169.5
Leap 15.2 arpwatch <= 2.1a15-lp152.5.5
SUSE Linux Enterprise Server 11-SP4-LTSS arpwatch < 2.1a15
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved