openSUSE: Security Advisory for hostinfo, supportutils (openSUSE-SU-2019:1351-1)
2019-05-09T00:00:00
ID OPENVAS:1361412562310852481 Type openvas Reporter Copyright (C) 2019 Greenbone Networks GmbH Modified 2020-01-31T00:00:00
Description
The remote host is missing an update for the
# Copyright (C) 2019 Greenbone Networks GmbH
# Text descriptions are largely excerpted from the referenced
# advisory, and are Copyright (C) the respective author(s)
#
# SPDX-License-Identifier: GPL-2.0-or-later
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.852481");
script_version("2020-01-31T08:04:39+0000");
script_cve_id("CVE-2018-19636", "CVE-2018-19637", "CVE-2018-19638", "CVE-2018-19639",
"CVE-2018-19640");
script_tag(name:"cvss_base", value:"7.2");
script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:N/C:C/I:C/A:C");
script_tag(name:"last_modification", value:"2020-01-31 08:04:39 +0000 (Fri, 31 Jan 2020)");
script_tag(name:"creation_date", value:"2019-05-09 02:00:51 +0000 (Thu, 09 May 2019)");
script_name("openSUSE: Security Advisory for hostinfo, supportutils (openSUSE-SU-2019:1351-1)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2019 Greenbone Networks GmbH");
script_family("SuSE Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/suse", "ssh/login/rpms", re:"ssh/login/release=openSUSELeap42\.3");
script_xref(name:"openSUSE-SU", value:"2019:1351-1");
script_xref(name:"URL", value:"https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00018.html");
script_tag(name:"summary", value:"The remote host is missing an update for the 'hostinfo, supportutils'
package(s) announced via the openSUSE-SU-2019:1351-1 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"This update for hostinfo, supportutils fixes the following issues:
Security issues fixed for supportutils:
- CVE-2018-19640: Fixed an issue where users could kill arbitrary
processes (bsc#1118463).
- CVE-2018-19638: Fixed an issue where users could overwrite arbitrary log
files (bsc#1118460).
- CVE-2018-19639: Fixed a code execution if run with -v (bsc#1118462).
- CVE-2018-19637: Fixed an issue where static temporary filename could
allow overwriting of files (bsc#1117776).
- CVE-2018-19636: Fixed a local root exploit via inclusion of attacker
controlled shell script (bsc#1117751).
Other issues fixed for supportutils:
- Fixed invalid exit code commands (bsc#1125666)
- SUSE separation in supportconfig (bsc#1125623)
- Clarified supportconfig(8) -x option (bsc#1115245)
- supportconfig: 3.0.127
- btrfs filesystem usage
- List products.d
- Dump lsof errors
- Added ha commands for corosync
- Dumped find errors in ib_info
Issues fixed in hostinfo:
- Removed extra kernel install dates (bsc#1099498)
- Resolved network bond issue (bsc#1054979)
This update was imported from the SUSE:SLE-12:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended
installation methods
like YaST online_update or 'zypper patch'.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2019-1351=1");
script_tag(name:"affected", value:"'hostinfo, ' package(s) on openSUSE Leap 42.3.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "openSUSELeap42.3") {
if(!isnull(res = isrpmvuln(pkg:"hostinfo", rpm:"hostinfo~1.0.1~21.3.1", rls:"openSUSELeap42.3"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
{"id": "OPENVAS:1361412562310852481", "type": "openvas", "bulletinFamily": "scanner", "title": "openSUSE: Security Advisory for hostinfo, supportutils (openSUSE-SU-2019:1351-1)", "description": "The remote host is missing an update for the ", "published": "2019-05-09T00:00:00", "modified": "2020-01-31T00:00:00", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310852481", "reporter": "Copyright (C) 2019 Greenbone Networks GmbH", "references": ["2019:1351-1", "https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00018.html"], "cvelist": ["CVE-2018-19637", "CVE-2018-19639", "CVE-2018-19636", "CVE-2018-19638", "CVE-2018-19640"], "lastseen": "2020-01-31T16:47:57", "viewCount": 5, "enchantments": {"dependencies": {"references": [{"type": "suse", "idList": ["OPENSUSE-SU-2019:1351-1", "OPENSUSE-SU-2019:0293-1"]}, {"type": "nessus", "idList": ["OPENSUSE-2019-293.NASL", "OPENSUSE-2019-1351.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310852332"]}, {"type": "cve", "idList": ["CVE-2018-19638", "CVE-2018-19637", "CVE-2018-19640", "CVE-2018-19639", "CVE-2018-19636"]}], "modified": "2020-01-31T16:47:57", "rev": 2}, "score": {"value": 7.0, "vector": "NONE", "modified": "2020-01-31T16:47:57", "rev": 2}, "vulnersScore": 7.0}, "pluginID": "1361412562310852481", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.852481\");\n script_version(\"2020-01-31T08:04:39+0000\");\n script_cve_id(\"CVE-2018-19636\", \"CVE-2018-19637\", \"CVE-2018-19638\", \"CVE-2018-19639\",\n \"CVE-2018-19640\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:04:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2019-05-09 02:00:51 +0000 (Thu, 09 May 2019)\");\n script_name(\"openSUSE: Security Advisory for hostinfo, supportutils (openSUSE-SU-2019:1351-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSELeap42\\.3\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2019:1351-1\");\n script_xref(name:\"URL\", value:\"https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00018.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'hostinfo, supportutils'\n package(s) announced via the openSUSE-SU-2019:1351-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"This update for hostinfo, supportutils fixes the following issues:\n\n Security issues fixed for supportutils:\n\n - CVE-2018-19640: Fixed an issue where users could kill arbitrary\n processes (bsc#1118463).\n\n - CVE-2018-19638: Fixed an issue where users could overwrite arbitrary log\n files (bsc#1118460).\n\n - CVE-2018-19639: Fixed a code execution if run with -v (bsc#1118462).\n\n - CVE-2018-19637: Fixed an issue where static temporary filename could\n allow overwriting of files (bsc#1117776).\n\n - CVE-2018-19636: Fixed a local root exploit via inclusion of attacker\n controlled shell script (bsc#1117751).\n\n Other issues fixed for supportutils:\n\n - Fixed invalid exit code commands (bsc#1125666)\n\n - SUSE separation in supportconfig (bsc#1125623)\n\n - Clarified supportconfig(8) -x option (bsc#1115245)\n\n - supportconfig: 3.0.127\n\n - btrfs filesystem usage\n\n - List products.d\n\n - Dump lsof errors\n\n - Added ha commands for corosync\n\n - Dumped find errors in ib_info\n\n Issues fixed in hostinfo:\n\n - Removed extra kernel install dates (bsc#1099498)\n\n - Resolved network bond issue (bsc#1054979)\n\n This update was imported from the SUSE:SLE-12:Update update project.\n\n Patch Instructions:\n\n To install this openSUSE Security Update use the SUSE recommended\n installation methods\n like YaST online_update or 'zypper patch'.\n\n Alternatively you can run the command listed for your product:\n\n - openSUSE Leap 42.3:\n\n zypper in -t patch openSUSE-2019-1351=1\");\n\n script_tag(name:\"affected\", value:\"'hostinfo, ' package(s) on openSUSE Leap 42.3.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSELeap42.3\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"hostinfo\", rpm:\"hostinfo~1.0.1~21.3.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "naslFamily": "SuSE Local Security Checks"}
{"suse": [{"lastseen": "2019-05-08T22:20:31", "bulletinFamily": "unix", "cvelist": ["CVE-2018-19637", "CVE-2018-19639", "CVE-2018-19636", "CVE-2018-19638", "CVE-2018-19640"], "description": "This update for hostinfo, supportutils fixes the following issues:\n\n Security issues fixed for supportutils:\n\n - CVE-2018-19640: Fixed an issue where users could kill arbitrary\n processes (bsc#1118463).\n - CVE-2018-19638: Fixed an issue where users could overwrite arbitrary log\n files (bsc#1118460).\n - CVE-2018-19639: Fixed a code execution if run with -v (bsc#1118462).\n - CVE-2018-19637: Fixed an issue where static temporary filename could\n allow overwriting of files (bsc#1117776).\n - CVE-2018-19636: Fixed a local root exploit via inclusion of attacker\n controlled shell script (bsc#1117751).\n\n Other issues fixed for supportutils:\n\n - Fixed invalid exit code commands (bsc#1125666)\n - SUSE separation in supportconfig (bsc#1125623)\n - Clarified supportconfig(8) -x option (bsc#1115245)\n - supportconfig: 3.0.127\n - btrfs filesystem usage\n - List products.d\n - Dump lsof errors\n - Added ha commands for corosync\n - Dumped find errors in ib_info\n\n Issues fixed in hostinfo:\n - Removed extra kernel install dates (bsc#1099498)\n - Resolved network bond issue (bsc#1054979)\n\n This update was imported from the SUSE:SLE-12:Update update project.\n\n", "edition": 1, "modified": "2019-05-08T21:09:51", "published": "2019-05-08T21:09:51", "id": "OPENSUSE-SU-2019:1351-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00018.html", "title": "Security update for hostinfo, supportutils (important)", "type": "suse", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-03-06T03:48:40", "bulletinFamily": "unix", "cvelist": ["CVE-2018-19637", "CVE-2018-19639", "CVE-2018-19638", "CVE-2018-19640"], "description": "This update for supportutils fixes the following issues:\n\n Security issues fixed:\n\n - CVE-2018-19640: Fixed an issue where users could kill arbitrary\n processes (bsc#1118463).\n - CVE-2018-19638: Fixed an issue where users could overwrite arbitrary log\n files (bsc#1118460).\n - CVE-2018-19639: Fixed a code execution if run with -v (bsc#1118462).\n - CVE-2018-19637: Fixed an issue where static temporary filename could\n allow overwriting of files (bsc#1117776).\n\n Other issues fixed:\n\n - Fixed invalid exit code commands (bsc#1125666).\n - Included additional SUSE separation (bsc#1125609).\n - Merged added listing of locked packes by zypper.\n - Exclude pam.txt per GDPR by default (bsc#1112461).\n - Clarified -x functionality in supportconfig(8) (bsc#1115245).\n - udev service and provide the whole journal content in supportconfig\n (bsc#1051797).\n - supportconfig collects tuned profile settings (bsc#1071545).\n - sfdisk -d no disk device specified (bsc#1043311).\n - Added vulnerabilites status check in basic-health.txt (bsc#1105849).\n - Added only sched_domain from cpu0.\n - Blacklist sched_domain from proc.txt (bsc#1046681).\n - Added firewall-cmd info.\n - Add ls -lA --time-style=long-iso /etc/products.d/\n - Dump lsof errors.\n - Added corosync status to ha_info.\n - Dump find errors in ib_info.\n\n This update was imported from the SUSE:SLE-15:Update update project.\n\n", "edition": 1, "modified": "2019-03-06T00:09:33", "published": "2019-03-06T00:09:33", "id": "OPENSUSE-SU-2019:0293-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00005.html", "title": "Security update for supportutils (important)", "type": "suse", "cvss": {"score": 0.0, "vector": "NONE"}}], "nessus": [{"lastseen": "2021-01-20T12:41:34", "description": "This update for hostinfo, supportutils fixes the following issues:\n	 Security issues fixed for supportutils :\n\n - CVE-2018-19640: Fixed an issue where users could kill\n arbitrary processes (bsc#1118463).\n\n - CVE-2018-19638: Fixed an issue where users could\n overwrite arbitrary log files (bsc#1118460).\n\n - CVE-2018-19639: Fixed a code execution if run with -v\n (bsc#1118462).\n\n - CVE-2018-19637: Fixed an issue where static temporary\n filename could allow overwriting of files (bsc#1117776).\n\n - CVE-2018-19636: Fixed a local root exploit via inclusion\n of attacker controlled shell script (bsc#1117751).\n\nOther issues fixed for supportutils :\n\n - Fixed invalid exit code commands (bsc#1125666)\n\n - SUSE separation in supportconfig (bsc#1125623)\n\n - Clarified supportconfig(8) -x option (bsc#1115245)\n\n - supportconfig: 3.0.127\n\n - btrfs filesystem usage\n\n - List products.d\n\n - Dump lsof errors\n\n - Added ha commands for corosync\n\n - Dumped find errors in ib_info\n\nIssues fixed in hostinfo :\n\n - Removed extra kernel install dates (bsc#1099498)\n\n - Resolved network bond issue (bsc#1054979)\n\nThis update was imported from the SUSE:SLE-12:Update update project.", "edition": 15, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-05-09T00:00:00", "title": "openSUSE Security Update : hostinfo / supportutils (openSUSE-2019-1351)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-19637", "CVE-2018-19639", "CVE-2018-19636", "CVE-2018-19638", "CVE-2018-19640"], "modified": "2019-05-09T00:00:00", "cpe": ["cpe:/o:novell:opensuse:42.3", "p-cpe:/a:novell:opensuse:hostinfo"], "id": "OPENSUSE-2019-1351.NASL", "href": "https://www.tenable.com/plugins/nessus/124712", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2019-1351.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(124712);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2018-19636\", \"CVE-2018-19637\", \"CVE-2018-19638\", \"CVE-2018-19639\", \"CVE-2018-19640\");\n\n script_name(english:\"openSUSE Security Update : hostinfo / supportutils (openSUSE-2019-1351)\");\n script_summary(english:\"Check for the openSUSE-2019-1351 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for hostinfo, supportutils fixes the following issues:\n	 Security issues fixed for supportutils :\n\n - CVE-2018-19640: Fixed an issue where users could kill\n arbitrary processes (bsc#1118463).\n\n - CVE-2018-19638: Fixed an issue where users could\n overwrite arbitrary log files (bsc#1118460).\n\n - CVE-2018-19639: Fixed a code execution if run with -v\n (bsc#1118462).\n\n - CVE-2018-19637: Fixed an issue where static temporary\n filename could allow overwriting of files (bsc#1117776).\n\n - CVE-2018-19636: Fixed a local root exploit via inclusion\n of attacker controlled shell script (bsc#1117751).\n\nOther issues fixed for supportutils :\n\n - Fixed invalid exit code commands (bsc#1125666)\n\n - SUSE separation in supportconfig (bsc#1125623)\n\n - Clarified supportconfig(8) -x option (bsc#1115245)\n\n - supportconfig: 3.0.127\n\n - btrfs filesystem usage\n\n - List products.d\n\n - Dump lsof errors\n\n - Added ha commands for corosync\n\n - Dumped find errors in ib_info\n\nIssues fixed in hostinfo :\n\n - Removed extra kernel install dates (bsc#1099498)\n\n - Resolved network bond issue (bsc#1054979)\n\nThis update was imported from the SUSE:SLE-12:Update update project.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1054979\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1099498\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1115245\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1117751\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1117776\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1118460\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1118462\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1118463\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1125623\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1125666\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected hostinfo / supportutils package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:hostinfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:42.3\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/03/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/05/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/05/09\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE42\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"42.3\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE42.3\", reference:\"hostinfo-1.0.1-21.3.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"hostinfo\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-20T12:50:49", "description": "This update for supportutils fixes the following issues :\n\nSecurity issues fixed :\n\n - CVE-2018-19640: Fixed an issue where users could kill\n arbitrary processes (bsc#1118463).\n\n - CVE-2018-19638: Fixed an issue where users could\n overwrite arbitrary log files (bsc#1118460).\n\n - CVE-2018-19639: Fixed a code execution if run with -v\n (bsc#1118462).\n\n - CVE-2018-19637: Fixed an issue where static temporary\n filename could allow overwriting of files (bsc#1117776).\n\nOther issues fixed :\n\n - Fixed invalid exit code commands (bsc#1125666).\n\n - Included additional SUSE separation (bsc#1125609).\n\n - Merged added listing of locked packes by zypper.\n\n - Exclude pam.txt per GDPR by default (bsc#1112461).	 \n\n - Clarified -x functionality in supportconfig(8)\n (bsc#1115245).	 \n\n - udev service and provide the whole journal content in\n supportconfig (bsc#1051797).\n\n - supportconfig collects tuned profile settings\n (bsc#1071545).\n\n - sfdisk -d no disk device specified (bsc#1043311).\n\n - Added vulnerabilites status check in basic-health.txt\n (bsc#1105849).\n\n - Added only sched_domain from cpu0.\n\n - Blacklist sched_domain from proc.txt (bsc#1046681).\n\n - Added firewall-cmd info.\n\n - Add ls -lA --time-style=long-iso /etc/products.d/\n\n - Dump lsof errors.\n\n - Added corosync status to ha_info.\n\n - Dump find errors in ib_info.\n\nThis update was imported from the SUSE:SLE-15:Update update project.", "edition": 15, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-03-06T00:00:00", "title": "openSUSE Security Update : supportutils (openSUSE-2019-293)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-19637", "CVE-2018-19639", "CVE-2018-19638", "CVE-2018-19640"], "modified": "2019-03-06T00:00:00", "cpe": ["cpe:/o:novell:opensuse:15.0", "p-cpe:/a:novell:opensuse:supportutils"], "id": "OPENSUSE-2019-293.NASL", "href": "https://www.tenable.com/plugins/nessus/122643", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2019-293.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(122643);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2018-19637\", \"CVE-2018-19638\", \"CVE-2018-19639\", \"CVE-2018-19640\");\n\n script_name(english:\"openSUSE Security Update : supportutils (openSUSE-2019-293)\");\n script_summary(english:\"Check for the openSUSE-2019-293 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for supportutils fixes the following issues :\n\nSecurity issues fixed :\n\n - CVE-2018-19640: Fixed an issue where users could kill\n arbitrary processes (bsc#1118463).\n\n - CVE-2018-19638: Fixed an issue where users could\n overwrite arbitrary log files (bsc#1118460).\n\n - CVE-2018-19639: Fixed a code execution if run with -v\n (bsc#1118462).\n\n - CVE-2018-19637: Fixed an issue where static temporary\n filename could allow overwriting of files (bsc#1117776).\n\nOther issues fixed :\n\n - Fixed invalid exit code commands (bsc#1125666).\n\n - Included additional SUSE separation (bsc#1125609).\n\n - Merged added listing of locked packes by zypper.\n\n - Exclude pam.txt per GDPR by default (bsc#1112461).	 \n\n - Clarified -x functionality in supportconfig(8)\n (bsc#1115245).	 \n\n - udev service and provide the whole journal content in\n supportconfig (bsc#1051797).\n\n - supportconfig collects tuned profile settings\n (bsc#1071545).\n\n - sfdisk -d no disk device specified (bsc#1043311).\n\n - Added vulnerabilites status check in basic-health.txt\n (bsc#1105849).\n\n - Added only sched_domain from cpu0.\n\n - Blacklist sched_domain from proc.txt (bsc#1046681).\n\n - Added firewall-cmd info.\n\n - Add ls -lA --time-style=long-iso /etc/products.d/\n\n - Dump lsof errors.\n\n - Added corosync status to ha_info.\n\n - Dump find errors in ib_info.\n\nThis update was imported from the SUSE:SLE-15:Update update project.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1043311\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1046681\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1051797\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1071545\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1105849\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112461\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1115245\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1117776\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1118460\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1118462\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1118463\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1125609\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1125666\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected supportutils package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:supportutils\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/03/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/03/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/03/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.0)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.0\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.0\", reference:\"supportutils-3.1-lp150.4.3.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"supportutils\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "openvas": [{"lastseen": "2020-01-31T16:53:10", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-19637", "CVE-2018-19639", "CVE-2018-19638", "CVE-2018-19640"], "description": "The remote host is missing an update for the ", "modified": "2020-01-31T00:00:00", "published": "2019-03-06T00:00:00", "id": "OPENVAS:1361412562310852332", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310852332", "type": "openvas", "title": "openSUSE: Security Advisory for supportutils (openSUSE-SU-2019:0293-1)", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.852332\");\n script_version(\"2020-01-31T08:23:39+0000\");\n script_cve_id(\"CVE-2018-19637\", \"CVE-2018-19638\", \"CVE-2018-19639\", \"CVE-2018-19640\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:23:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2019-03-06 04:09:22 +0100 (Wed, 06 Mar 2019)\");\n script_name(\"openSUSE: Security Advisory for supportutils (openSUSE-SU-2019:0293-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSELeap15\\.0\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2019:0293-1\");\n script_xref(name:\"URL\", value:\"https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00005.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'supportutils'\n package(s) announced via the openSUSE-SU-2019:0293-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"This update for supportutils fixes the following issues:\n\n Security issues fixed:\n\n - CVE-2018-19640: Fixed an issue where users could kill arbitrary\n processes (bsc#1118463).\n\n - CVE-2018-19638: Fixed an issue where users could overwrite arbitrary log\n files (bsc#1118460).\n\n - CVE-2018-19639: Fixed a code execution if run with -v (bsc#1118462).\n\n - CVE-2018-19637: Fixed an issue where static temporary filename could\n allow overwriting of files (bsc#1117776).\n\n Other issues fixed:\n\n - Fixed invalid exit code commands (bsc#1125666).\n\n - Included additional SUSE separation (bsc#1125609).\n\n - Merged added listing of locked packes by zypper.\n\n - Exclude pam.txt per GDPR by default (bsc#1112461).\n\n - Clarified -x functionality in supportconfig(8) (bsc#1115245).\n\n - udev service and provide the whole journal content in supportconfig\n (bsc#1051797).\n\n - supportconfig collects tuned profile settings (bsc#1071545).\n\n - sfdisk -d no disk device specified (bsc#1043311).\n\n - Added vulnerabilities status check in basic-health.txt (bsc#1105849).\n\n - Added only sched_domain from cpu0.\n\n - Blacklist sched_domain from proc.txt (bsc#1046681).\n\n - Added firewall-cmd info.\n\n - Add ls -lA --time-style=long-iso /etc/products.d/\n\n - Dump lsof errors.\n\n - Added corosync status to ha_info.\n\n - Dump find errors in ib_info.\n\n This update was imported from the SUSE:SLE-15:Update update project.\n\n Patch Instructions:\n\n To install this openSUSE Security Update use the SUSE recommended\n installation methods\n like YaST online_update or 'zypper patch'.\n\n Alternatively you can run the command listed for your product:\n\n - openSUSE Leap 15.0:\n\n zypper in -t patch openSUSE-2019-293=1\");\n\n script_tag(name:\"affected\", value:\"supportutils on openSUSE Leap 15.0.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSELeap15.0\") {\n if(!isnull(res = isrpmvuln(pkg:\"supportutils\", rpm:\"supportutils~3.1~lp150.4.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "cve": [{"lastseen": "2021-02-02T06:52:34", "description": "If supportutils before version 3.1-5.7.1 is run with -v to perform rpm verification and the attacker manages to manipulate the rpm listing (e.g. with CVE-2018-19638) he can execute arbitrary commands as root.", "edition": 7, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2019-03-05T16:29:00", "title": "CVE-2018-19639", "type": "cve", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-19639"], "modified": "2019-10-03T00:03:00", "cpe": [], "id": "CVE-2018-19639", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-19639", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": []}, {"lastseen": "2021-02-02T06:52:34", "description": "If the attacker manages to create files in the directory used to collect log files in supportutils before version 3.1-5.7.1 (e.g. with CVE-2018-19638) he can kill arbitrary processes on the local machine.", "edition": 6, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 5.5, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2019-03-05T16:29:00", "title": "CVE-2018-19640", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 2.1, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-19640"], "modified": "2019-05-08T21:29:00", "cpe": [], "id": "CVE-2018-19640", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-19640", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": []}, {"lastseen": "2021-02-02T06:52:34", "description": "Supportutils, before version 3.1-5.7.1, when run with command line argument -A searched the file system for a ndspath binary. If an attacker provides one at an arbitrary location it is executed with root privileges", "edition": 6, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2019-03-05T16:29:00", "title": "CVE-2018-19636", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-19636"], "modified": "2019-05-08T21:29:00", "cpe": [], "id": "CVE-2018-19636", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-19636", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": []}, {"lastseen": "2021-02-02T06:52:34", "description": "In supportutils, before version 3.1-5.7.1 and if pacemaker is installed on the system, an unprivileged user could have overwritten arbitrary files in the directory that is used by supportutils to collect the log files.", "edition": 6, "cvss3": {"exploitabilityScore": 1.0, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "baseScore": 4.7, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2019-03-05T16:29:00", "title": "CVE-2018-19638", "type": "cve", "cwe": ["CWE-59"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 3.3, "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-19638"], "modified": "2019-05-08T21:29:00", "cpe": [], "id": "CVE-2018-19638", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-19638", "cvss": {"score": 3.3, "vector": "AV:L/AC:M/Au:N/C:N/I:P/A:P"}, "cpe23": []}, {"lastseen": "2021-02-02T06:52:34", "description": "Supportutils, before version 3.1-5.7.1, wrote data to static file /tmp/supp_log, allowing local attackers to overwrite files on systems without symlink protection", "edition": 6, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "baseScore": 5.5, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2019-03-05T16:29:00", "title": "CVE-2018-19637", "type": "cve", "cwe": ["CWE-59"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 3.6, "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-19637"], "modified": "2019-05-08T21:29:00", "cpe": [], "id": "CVE-2018-19637", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-19637", "cvss": {"score": 3.6, "vector": "AV:L/AC:L/Au:N/C:N/I:P/A:P"}, "cpe23": []}]}