Learn about CVE-2019-3688, a vulnerability in SUSE Linux Enterprise Server allowing attackers to gain persistence by altering the /usr/sbin/pinger binary. Find mitigation steps and patching details here.
In previous versions of SUSE Linux Enterprise Server 15 and 12, a vulnerability in the /usr/sbin/pinger binary packaged with squid allowed attackers to gain persistence by altering the binary.
Understanding CVE-2019-3688
This CVE involves incorrect default permissions in the squid package on SUSE Linux Enterprise Server.
What is CVE-2019-3688?
The vulnerability in the /usr/sbin/pinger binary in SUSE Linux Enterprise Server 15 and 12 allowed attackers to exploit the squid user's compromised permissions to establish persistence.
The Impact of CVE-2019-3688
The vulnerability had a CVSS base score of 5.1, with low attack complexity and vector being local. It posed a medium severity risk with low availability and integrity impact.
Technical Details of CVE-2019-3688
The technical details of the vulnerability in the squid package on SUSE Linux Enterprise Server.
Vulnerability Description
The /usr/sbin/pinger binary in SUSE Linux Enterprise Server 15 and 12 had incorrect permissions (squid:root, 0750), enabling attackers to modify the binary and maintain persistence.
Affected Systems and Versions
Exploitation Mechanism
Attackers could exploit compromised squid user permissions to alter the /usr/sbin/pinger binary and establish persistence.
Mitigation and Prevention
Steps to mitigate and prevent the CVE-2019-3688 vulnerability.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates