Learn about CVE-2019-3692, a high-severity vulnerability allowing local attackers to escalate privileges from user "inn" to root in SUSE Linux Enterprise Server 11, openSUSE Factory, and openSUSE Leap 15.1. Find mitigation steps and patching advice here.
Local attackers can exploit symlink attacks to escalate privileges from the user "inn" to the root user in SUSE Linux Enterprise Server 11, openSUSE Factory, and openSUSE Leap 15.1.
Understanding CVE-2019-3692
This CVE involves a local privilege escalation vulnerability in the packaging of inn software.
What is CVE-2019-3692?
The vulnerability allows local attackers to elevate their privileges from the user "inn" to the root user through symlink attacks in specific versions of SUSE Linux Enterprise Server 11, openSUSE Factory, and openSUSE Leap 15.1.
The Impact of CVE-2019-3692
The vulnerability has a CVSS base score of 7.7, indicating a high severity level. It can lead to high confidentiality and integrity impacts.
Technical Details of CVE-2019-3692
This section provides more technical insights into the vulnerability.
Vulnerability Description
Local privilege escalation from user "inn" to root via symlink attacks in the packaging of inn software.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability can be exploited by local attackers using symlink attacks to gain root privileges.
Mitigation and Prevention
Protect your systems from CVE-2019-3692 with the following steps:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates