SUSE SLES12 Security Update : permissions (SUSE-SU-2021:2280-1)

high Nessus Plugin ID 151491

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES12 / SLES_SAP12 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2021:2280-1 advisory.

- The /usr/sbin/pinger binary packaged with squid in SUSE Linux Enterprise Server 15 before and including version 4.8-5.8.1 and in SUSE Linux Enterprise Server 12 before and including 3.5.21-26.17.1 had squid:root, 0750 permissions. This allowed an attacker that compromissed the squid user to gain persistence by changing the binary (CVE-2019-3688)

- The chkstat tool in the permissions package followed symlinks before commit a9e1d26cd49ef9ee0c2060c859321128a6dd4230 (please also check the additional hardenings after this fix).
This allowed local attackers with control over a path that is traversed by chkstat to escalate privileges.
(CVE-2019-3690)

- A UNIX Symbolic Link (Symlink) Following vulnerability in chkstat of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15, SUSE Linux Enterprise Server 11 set permissions intended for specific binaries on other binaries because it erroneously followed symlinks. The symlinks can't be controlled by attackers on default systems, so exploitation is difficult. This issue affects: SUSE Linux Enterprise Server 12 permissions versions prior to 2015.09.28.1626-17.27.1. SUSE Linux Enterprise Server 15 permissions versions prior to 20181116-9.23.1. SUSE Linux Enterprise Server 11 permissions versions prior to 2013.1.7-0.6.12.1. (CVE-2020-8013)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected permissions package.

See Also

https://bugzilla.suse.com/1047247

https://bugzilla.suse.com/1050467

https://bugzilla.suse.com/1093414

https://bugzilla.suse.com/1097665

https://bugzilla.suse.com/1123886

https://bugzilla.suse.com/1150734

https://bugzilla.suse.com/1155939

https://bugzilla.suse.com/1157198

https://bugzilla.suse.com/1160594

https://bugzilla.suse.com/1160764

https://bugzilla.suse.com/1161779

https://bugzilla.suse.com/1163922

https://bugzilla.suse.com/1171883

https://bugzilla.suse.com/1182899

https://www.suse.com/security/cve/CVE-2019-3688

https://www.suse.com/security/cve/CVE-2019-3690

https://www.suse.com/security/cve/CVE-2020-8013

http://www.nessus.org/u?2b2243e1

Plugin Details

Severity: High

ID: 151491

File Name: suse_SU-2021-2280-1.nasl

Version: 1.5

Type: local

Agent: unix

Published: 7/10/2021

Updated: 7/13/2023

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2019-3690

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:permissions, cpe:/o:novell:suse_linux:12

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 7/9/2021

Vulnerability Publication Date: 10/7/2019

Reference Information

CVE: CVE-2019-3688, CVE-2019-3690, CVE-2020-8013

SuSE: SUSE-SU-2021:2280-1