A UNIX Symbolic Link (Symlink) Following vulnerability in arpwatch of SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Manager Server 4.0, SUSE OpenStack Cloud Crowbar 9; openSUSE Factory, Leap 15.2 allows local attackers with control of the runtime user to run arpwatch as to escalate to root upon the next restart of arpwatch. This issue affects: SUSE Linux Enterprise Server 11-SP4-LTSS arpwatch versions prior to 2.1a15. SUSE Manager Server 4.0 arpwatch versions prior to 2.1a15. SUSE OpenStack Cloud Crowbar 9 arpwatch versions prior to 2.1a15. openSUSE Factory arpwatch version 2.1a15-169.5 and prior versions. openSUSE Leap 15.2 arpwatch version 2.1a15-lp152.5.5 and prior versions.
References
Link | Resource |
---|---|
https://bugzilla.suse.com/show_bug.cgi?id=1186240 | Exploit Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
26 Oct 2022, 00:30
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-59 |
12 Jul 2021, 13:56
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 7.8 |
CWE | CWE-61 | |
References | (CONFIRM) https://bugzilla.suse.com/show_bug.cgi?id=1186240 - Exploit, Issue Tracking, Vendor Advisory | |
CPE | cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:ltss:*:*:* cpe:2.3:a:opensuse:factory:-:*:*:*:*:*:*:* cpe:2.3:a:suse:openstack_cloud_crowbar:9.0:*:*:*:*:*:*:* cpe:2.3:a:suse:manager_server:4.0:*:*:*:*:*:*:* cpe:2.3:a:suse:arpwatch:*:*:*:*:*:*:*:* cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:* |
30 Jun 2021, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-06-30 09:15
Updated : 2024-02-04 21:47
NVD link : CVE-2021-25321
Mitre link : CVE-2021-25321
CVE.ORG link : CVE-2021-25321
JSON object : View
Products Affected
suse
- openstack_cloud_crowbar
- manager_server
- linux_enterprise_server
- arpwatch
opensuse
- factory
- leap
CWE