Lucene search

K
ubuntucveUbuntu.comUB:CVE-2019-3688
HistoryOct 07, 2019 - 12:00 a.m.

CVE-2019-3688

2019-10-0700:00:00
ubuntu.com
ubuntu.com
9

7.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

6.6 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:C/A:C

0.001 Low

EPSS

Percentile

29.6%

The /usr/sbin/pinger binary packaged with squid in SUSE Linux Enterprise
Server 15 before and including version 4.8-5.8.1 and in SUSE Linux
Enterprise Server 12 before and including 3.5.21-26.17.1 had squid:root,
0750 permissions. This allowed an attacker that compromissed the squid user
to gain persistence by changing the binary

Bugs

Notes

Author Note
mdeslaur this is a SUSE specific packaging issue.

7.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

6.6 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:C/A:C

0.001 Low

EPSS

Percentile

29.6%

Related for UB:CVE-2019-3688