CERTA-2003-AVI-014
Vulnerability from certfr_avis

Une vulnérabilité du paquetage susehelp permet à un utilisateur mal intentionné d'exécuter du code arbitraire à distance.

Description

Le paquetage susehelp contient de l'aide pour l'installation et la configuration de la distribution SuSE. Ce paquetage n'est pas installé par défaut.

Un des programmes CGI (Common Gateway Interface) présente une vulnérabilité, qui peut être exploitée si l'utilitaire susehelp est accessible depuis un serveur HTTP installé sur la machine. Dans ce cas-là, il est possible d'exécuter du code arbitraire avec les droits du serveur (wwwrun).

Solution

Appliquer le correctif disponible sur le site de SuSE (cf. section Documentation).

None
Impacted products
Vendor Product Description
SUSE SUSE Linux Enterprise Server SuSE Linux Enterprise Server 8 ;
Microsoft Office SuSE Linux Office Server ;
SUSE N/A SuSE Linux Openexchange Server 4.
SUSE N/A SuSE Linux 8.1 ;
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SuSE Linux Enterprise Server 8 ;",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SuSE Linux Office Server ;",
      "product": {
        "name": "Office",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "SuSE Linux Openexchange Server 4.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SuSE Linux 8.1 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nLe paquetage susehelp contient de l\u0027aide pour l\u0027installation et la\nconfiguration de la distribution SuSE. Ce paquetage n\u0027est pas install\u00e9\npar d\u00e9faut.  \n\nUn des programmes CGI (Common Gateway Interface) pr\u00e9sente une\nvuln\u00e9rabilit\u00e9, qui peut \u00eatre exploit\u00e9e si l\u0027utilitaire susehelp est\naccessible depuis un serveur HTTP install\u00e9 sur la machine. Dans ce\ncas-l\u00e0, il est possible d\u0027ex\u00e9cuter du code arbitraire avec les droits du\nserveur (wwwrun).\n\n## Solution\n\nAppliquer le correctif disponible sur le site de SuSE (cf. section\nDocumentation).\n",
  "cves": [],
  "initial_release_date": "2003-01-24T00:00:00",
  "last_revision_date": "2003-01-24T00:00:00",
  "links": [],
  "reference": "CERTA-2003-AVI-014",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2003-01-24T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 du paquetage \u003cspan class=\"textit\"\u003esusehelp\u003c/span\u003e\npermet \u00e0 un utilisateur mal intentionn\u00e9 d\u0027ex\u00e9cuter du code arbitraire \u00e0\ndistance.\n",
  "title": "Vuln\u00e9rabilit\u00e9 de susehelp",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Avis de s\u00e9curit\u00e9 SuSE SuSE-SA:2003:005",
      "url": "http://www.suse.de/de/security/2003_005_susehelp.html"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…