arpwatch: Local privilege escalation from runtime user to root
Key Information
- Vendor
- Suse
- Status
- Suse Linux Enterprise Server 11-sp4-ltss
- Suse Manager Server 4.0
- Suse Openstack Cloud Crowbar 9
- Factory
- Vendor
- CVE Published:
- 28 June 2021
Summary
A UNIX Symbolic Link (Symlink) Following vulnerability in arpwatch of SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Manager Server 4.0, SUSE OpenStack Cloud Crowbar 9; openSUSE Factory, Leap 15.2 allows local attackers with control of the runtime user to run arpwatch as to escalate to root upon the next restart of arpwatch. This issue affects: SUSE Linux Enterprise Server 11-SP4-LTSS arpwatch versions prior to 2.1a15. SUSE Manager Server 4.0 arpwatch versions prior to 2.1a15. SUSE OpenStack Cloud Crowbar 9 arpwatch versions prior to 2.1a15. openSUSE Factory arpwatch version 2.1a15-169.5 and prior versions. openSUSE Leap 15.2 arpwatch version 2.1a15-lp152.5.5 and prior versions.
Affected Version(s)
SUSE Linux Enterprise Server 11-SP4-LTSS < 2.1a15
SUSE Manager Server 4.0 < 2.1a15
SUSE OpenStack Cloud Crowbar 9 < 2.1a15
CVSS V3.1
Timeline
Vulnerability published.
Vulnerability Reserved.