CVE-2018-19639

If supportutils before version 3.1-5.7.1 is run with -v to perform rpm verification and the attacker manages to manipulate the rpm listing (e.g. with CVE-2018-19638) he can execute arbitrary commands as root.
Configurations

Configuration 1 (hide)

cpe:2.3:a:opensuse:supportutils:*:*:*:*:*:*:*:*

History

07 Nov 2023, 02:55

Type Values Removed Values Added
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00018.html - () http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00018.html -
References (CONFIRM) https://bugzilla.suse.com/show_bug.cgi?id=1118462 - Exploit, Issue Tracking, Vendor Advisory () https://bugzilla.suse.com/show_bug.cgi?id=1118462 -

Information

Published : 2019-03-05 16:29

Updated : 2024-02-28 16:48


NVD link : CVE-2018-19639

Mitre link : CVE-2018-19639

CVE.ORG link : CVE-2018-19639


JSON object : View

Products Affected

opensuse

  • supportutils
CWE
NVD-CWE-noinfo CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')