SUSE update for osc



Risk High
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2019-3681
CVE-2019-3685
CWE-ID CWE-73
CWE-451
Exploitation vector Network
Public exploit N/A
Vulnerable software
SUSE Linux Enterprise Software Development Kit
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP Applications
Operating systems & Components / Operating system

SUSE Linux Enterprise Server
Operating systems & Components / Operating system

osc
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) External Control of File Name or Path

EUVDB-ID: #VU70539

Risk: High

CVSSv3.1: 7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-3681

CWE-ID: CWE-73 - External Control of File Name or Path

Exploit availability: No

Description

The vulnerability allows a remote attacker to overwrite arbitrary files during file download.

The vulnerability exists due to application allows an attacker to control path of the files that are being downloaded. A remote attacker can change downloaded packages to overwrite arbitrary files on the system.

Mitigation

Update the affected package osc to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Software Development Kit: 12-SP5

SUSE Linux Enterprise Server for SAP Applications: 12-SP5

SUSE Linux Enterprise Server: 12-SP5

osc: before 0.182.0-15.12.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2022/suse-su-20224351-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Spoofing attack

EUVDB-ID: #VU20061

Risk: Low

CVSSv3.1: 3.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-3685

CWE-ID: CWE-451 - User Interface (UI) Misrepresentation of Critical Information (Clickjacking, spoofing)

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to incorrect processing of untrusted TLS certificates. A remote attacker can create a specially crafted TLS certificate and perform Man-in-the-Middle (MitM) attack.

Mitigation

Update the affected package osc to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Software Development Kit: 12-SP5

SUSE Linux Enterprise Server for SAP Applications: 12-SP5

SUSE Linux Enterprise Server: 12-SP5

osc: before 0.182.0-15.12.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2022/suse-su-20224351-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###