SUSE update for Recommended update for crmsh



Published: 2024-07-12
Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2016-1417
CWE-ID CWE-427
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
SUSE Linux Enterprise High Availability Extension 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP Applications 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 15
Operating systems & Components / Operating system

SUSE Linux Enterprise High Performance Computing 15
Operating systems & Components / Operating system

openSUSE Leap
Operating systems & Components / Operating system

crmsh
Operating systems & Components / Operating system package or component

crmsh-test
Operating systems & Components / Operating system package or component

crmsh-scripts
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Insecure library loading

EUVDB-ID: #VU738

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2016-1417

CWE-ID: CWE-427 - Uncontrolled Search Path Element

Exploit availability: No

Description

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to absence of validation of search path when loading DLL files. A remote attacker can place malicious 'tcapi.dll' DLL file on the SBM or WebDav share and trick the victim to load a pcap file from that location.

Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.

Mitigation

Update the affected package Recommended update for crmsh to the latest version.

Vulnerable software versions

SUSE Linux Enterprise High Availability Extension 15: SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

crmsh: before 4.5.1+20240531.f62a43e-150500.3.28.2

crmsh-test: before 4.5.1+20240531.f62a43e-150500.3.28.2

crmsh-scripts: before 4.5.1+20240531.f62a43e-150500.3.28.2

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-ru-20242419-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###