Vulnerability Description
The /usr/sbin/pinger binary packaged with squid in SUSE Linux Enterprise Server 15 before and including version 4.8-5.8.1 and in SUSE Linux Enterprise Server 12 before and including 3.5.21-26.17.1 had squid:root, 0750 permissions. This allowed an attacker that compromissed the squid user to gain persistence by changing the binary
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Suse | Suse Linux Enterprise Server | 12 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00024.html
- https://bugzilla.suse.com/show_bug.cgi?id=1093414Issue TrackingVendor Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00024.html
- https://bugzilla.suse.com/show_bug.cgi?id=1093414Issue TrackingVendor Advisory
FAQ
What is CVE-2019-3688?
CVE-2019-3688 is a vulnerability with a CVSS score of 5.1 (MEDIUM). The /usr/sbin/pinger binary packaged with squid in SUSE Linux Enterprise Server 15 before and including version 4.8-5.8.1 and in SUSE Linux Enterprise Server 12 before and including 3.5.21-26.17.1 had...
How severe is CVE-2019-3688?
CVE-2019-3688 has been rated MEDIUM with a CVSS base score of 5.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-3688?
Check the references section above for vendor advisories and patch information. Affected products include: Suse Suse Linux Enterprise Server.