The SuSEfirewall2 package before 3.6.312-2.13.1 in SUSE Linux Enterprise (SLE) Desktop 12 SP2, Server 12 SP2, and Server for Raspberry Pi 12 SP2; before 3.6.312.333-3.10.1 in SLE Desktop 12 SP3 and Server 12 SP3; before 3.6_SVNr208-2.18.3.1 in SLE Server 11 SP4; before 3.6.312-5.9.1 in openSUSE Leap 42.2; and before 3.6.312.333-7.1 in openSUSE Leap 42.3 might allow remote attackers to bypass intended access restrictions on the portmap service by leveraging a missing source net restriction for _rpc_ services.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-updates/2017-11/msg00014.html | Vendor Advisory |
http://lists.opensuse.org/opensuse-updates/2017-11/msg00014.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-updates/2017-11/msg00014.html - Vendor Advisory |
Information
Published : 2017-11-10 02:29
Updated : 2024-11-21 03:14
NVD link : CVE-2017-15638
Mitre link : CVE-2017-15638
CVE.ORG link : CVE-2017-15638
JSON object : View
Products Affected
suse
- linux_enterprise_server
- linux_enterprise_desktop
- linux_enterprise_server_for_raspberry_pi
- susefirewall2
opensuse
- leap
CWE