Vulnerability Description
A code injection in the supportconfig data collection tool in supportutils in SUSE Linux Enterprise Server 12 and 12-SP1 and SUSE Linux Enterprise Desktop 12 and 12-SP1 could be used by local attackers to execute code as the user running supportconfig (usually root).
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Suse | Linux Enterprise Desktop | 12 |
| Suse | Linux Enterprise Server | 12 |
| Suse | Suse Linux Enterprise Server | 12 |
Related Weaknesses (CWE)
References
- http://lists.suse.com/pipermail/sle-security-updates/2016-June/002096.html
- http://lists.suse.com/pipermail/sle-security-updates/2016-June/002096.html
FAQ
What is CVE-2016-1602?
CVE-2016-1602 is a vulnerability with a CVSS score of 7.8 (HIGH). A code injection in the supportconfig data collection tool in supportutils in SUSE Linux Enterprise Server 12 and 12-SP1 and SUSE Linux Enterprise Desktop 12 and 12-SP1 could be used by local attacker...
How severe is CVE-2016-1602?
CVE-2016-1602 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-1602?
Check the references section above for vendor advisories and patch information. Affected products include: Suse Linux Enterprise Desktop, Suse Linux Enterprise Server, Suse Suse Linux Enterprise Server.