CVE-2019-3693

A symlink following vulnerability in the packaging of mailman in SUSE Linux Enterprise Server 11, SUSE Linux Enterprise Server 12; openSUSE Leap 15.1 allowed local attackers to escalate their privileges from user wwwrun to root. Additionally arbitrary files could be changed to group mailman. This issue affects: SUSE Linux Enterprise Server 11 mailman versions prior to 2.1.15-9.6.15.1. SUSE Linux Enterprise Server 12 mailman versions prior to 2.1.17-3.11.1. openSUSE Leap 15.1 mailman version 2.1.29-lp151.2.14 and prior versions.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:suse:mailman:*:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:suse:mailman:*:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:a:suse:mailman:*:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*

History

No history.

Information

Published : 2020-01-24 10:15

Updated : 2024-02-28 17:28


NVD link : CVE-2019-3693

Mitre link : CVE-2019-3693

CVE.ORG link : CVE-2019-3693


JSON object : View

Products Affected

opensuse

  • backports_sle
  • leap

suse

  • linux_enterprise_server
  • mailman
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')