CVE-2019-3695 involves a vulnerability in SUSE Linux Enterprise and openSUSE Leap, allowing local privilege escalation from user pcp to root. Learn about the impact, affected systems, and mitigation steps.
A vulnerability has been identified in the packaging of pcp in various versions of SUSE Linux Enterprise and openSUSE Leap, allowing local privilege escalation from user pcp to root.
Understanding CVE-2019-3695
This CVE involves an Improper Control of Generation of Code vulnerability in the pcp package across multiple SUSE Linux Enterprise and openSUSE Leap versions.
What is CVE-2019-3695?
CVE-2019-3695 is a security flaw that enables a user with the username "pcp" to execute code as the root user by placing it into the file /var/log/pcp/configs.sh.
The Impact of CVE-2019-3695
The vulnerability has a CVSS base score of 8.4, indicating a high severity issue with significant impacts on confidentiality, integrity, and availability.
Technical Details of CVE-2019-3695
This section provides detailed technical information about the vulnerability.
Vulnerability Description
The vulnerability allows the user pcp to run code as root by placing it into /var/log/pcp/configs.sh.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability allows the user pcp to escalate privileges to root by manipulating the /var/log/pcp/configs.sh file.
Mitigation and Prevention
To address CVE-2019-3695, follow these steps:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates