Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2021-28657 CVE-2021-31607 |
CWE-ID | CWE-835 CWE-77 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
SUSE Linux Enterprise Module for SUSE Manager Server Operating systems & Components / Operating system tika-core Operating systems & Components / Operating system package or component susemanager-web-libs Operating systems & Components / Operating system package or component susemanager-sls Operating systems & Components / Operating system package or component susemanager-docs_en-pdf Operating systems & Components / Operating system package or component susemanager-docs_en Operating systems & Components / Operating system package or component susemanager-doc-indexes Operating systems & Components / Operating system package or component spacewalk-utils Operating systems & Components / Operating system package or component spacewalk-taskomatic Operating systems & Components / Operating system package or component spacewalk-java-postgresql Operating systems & Components / Operating system package or component spacewalk-java-lib Operating systems & Components / Operating system package or component spacewalk-java-config Operating systems & Components / Operating system package or component spacewalk-java Operating systems & Components / Operating system package or component spacewalk-html Operating systems & Components / Operating system package or component spacewalk-base-minimal-config Operating systems & Components / Operating system package or component spacewalk-base-minimal Operating systems & Components / Operating system package or component spacewalk-base Operating systems & Components / Operating system package or component spacewalk-backend-xmlrpc Operating systems & Components / Operating system package or component spacewalk-backend-xml-export-libs Operating systems & Components / Operating system package or component spacewalk-backend-tools Operating systems & Components / Operating system package or component spacewalk-backend-sql-postgresql Operating systems & Components / Operating system package or component spacewalk-backend-sql Operating systems & Components / Operating system package or component spacewalk-backend-server Operating systems & Components / Operating system package or component spacewalk-backend-package-push-server Operating systems & Components / Operating system package or component spacewalk-backend-iss-export Operating systems & Components / Operating system package or component spacewalk-backend-iss Operating systems & Components / Operating system package or component spacewalk-backend-config-files-tool Operating systems & Components / Operating system package or component spacewalk-backend-config-files-common Operating systems & Components / Operating system package or component spacewalk-backend-config-files Operating systems & Components / Operating system package or component spacewalk-backend-applet Operating systems & Components / Operating system package or component spacewalk-backend-app Operating systems & Components / Operating system package or component spacewalk-backend Operating systems & Components / Operating system package or component python3-spacewalk-backend-libs Operating systems & Components / Operating system package or component py27-compat-salt Operating systems & Components / Operating system package or component py26-compat-salt Operating systems & Components / Operating system package or component pxe-default-image-sle15 Operating systems & Components / Operating system package or component prometheus-exporters-formula Operating systems & Components / Operating system package or component grafana-formula Operating systems & Components / Operating system package or component susemanager-tools Operating systems & Components / Operating system package or component susemanager Operating systems & Components / Operating system package or component patterns-suma_server Operating systems & Components / Operating system package or component patterns-suma_retail Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU51796
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-28657
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within MP3Parser component. A remote attacker can suply a specially crafted file, consume all available system resources and cause denial of service conditions.
MitigationUpdate the affected package SUSE Manager Server 4.0 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for SUSE Manager Server: 4.0
tika-core: before 1.26-3.6.3
susemanager-web-libs: before 4.0.28-3.45.1
susemanager-sls: before 4.0.35-3.48.3
susemanager-docs_en-pdf: before 4.0-10.36.3
susemanager-docs_en: before 4.0-10.36.3
susemanager-doc-indexes: before 4.0-10.36.4
spacewalk-utils: before 4.0.21-3.30.3
spacewalk-taskomatic: before 4.0.44-3.57.5
spacewalk-java-postgresql: before 4.0.44-3.57.5
spacewalk-java-lib: before 4.0.44-3.57.5
spacewalk-java-config: before 4.0.44-3.57.5
spacewalk-java: before 4.0.44-3.57.5
spacewalk-html: before 4.0.28-3.45.1
spacewalk-base-minimal-config: before 4.0.28-3.45.1
spacewalk-base-minimal: before 4.0.28-3.45.1
spacewalk-base: before 4.0.28-3.45.1
spacewalk-backend-xmlrpc: before 4.0.38-3.47.4
spacewalk-backend-xml-export-libs: before 4.0.38-3.47.4
spacewalk-backend-tools: before 4.0.38-3.47.4
spacewalk-backend-sql-postgresql: before 4.0.38-3.47.4
spacewalk-backend-sql: before 4.0.38-3.47.4
spacewalk-backend-server: before 4.0.38-3.47.4
spacewalk-backend-package-push-server: before 4.0.38-3.47.4
spacewalk-backend-iss-export: before 4.0.38-3.47.4
spacewalk-backend-iss: before 4.0.38-3.47.4
spacewalk-backend-config-files-tool: before 4.0.38-3.47.4
spacewalk-backend-config-files-common: before 4.0.38-3.47.4
spacewalk-backend-config-files: before 4.0.38-3.47.4
spacewalk-backend-applet: before 4.0.38-3.47.4
spacewalk-backend-app: before 4.0.38-3.47.4
spacewalk-backend: before 4.0.38-3.47.4
python3-spacewalk-backend-libs: before 4.0.38-3.47.4
py27-compat-salt: before 3000.3-4.3.3
py26-compat-salt: before 2016.11.10-10.28.3
pxe-default-image-sle15: before 4.0.1-20210621145802
prometheus-exporters-formula: before 0.7.6-3.19.3
grafana-formula: before 0.2.3-4.16.3
susemanager-tools: before 4.0.34-3.52.3
susemanager: before 4.0.34-3.52.3
patterns-suma_server: before 4.0-9.19.3
patterns-suma_retail: before 4.0-9.19.3
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20212114-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU58292
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-31607
CWE-ID:
CWE-77 - Command injection
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to command injection in the snapper module. A local user can escalate privileges on a minion.
MitigationUpdate the affected package SUSE Manager Server 4.0 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for SUSE Manager Server: 4.0
tika-core: before 1.26-3.6.3
susemanager-web-libs: before 4.0.28-3.45.1
susemanager-sls: before 4.0.35-3.48.3
susemanager-docs_en-pdf: before 4.0-10.36.3
susemanager-docs_en: before 4.0-10.36.3
susemanager-doc-indexes: before 4.0-10.36.4
spacewalk-utils: before 4.0.21-3.30.3
spacewalk-taskomatic: before 4.0.44-3.57.5
spacewalk-java-postgresql: before 4.0.44-3.57.5
spacewalk-java-lib: before 4.0.44-3.57.5
spacewalk-java-config: before 4.0.44-3.57.5
spacewalk-java: before 4.0.44-3.57.5
spacewalk-html: before 4.0.28-3.45.1
spacewalk-base-minimal-config: before 4.0.28-3.45.1
spacewalk-base-minimal: before 4.0.28-3.45.1
spacewalk-base: before 4.0.28-3.45.1
spacewalk-backend-xmlrpc: before 4.0.38-3.47.4
spacewalk-backend-xml-export-libs: before 4.0.38-3.47.4
spacewalk-backend-tools: before 4.0.38-3.47.4
spacewalk-backend-sql-postgresql: before 4.0.38-3.47.4
spacewalk-backend-sql: before 4.0.38-3.47.4
spacewalk-backend-server: before 4.0.38-3.47.4
spacewalk-backend-package-push-server: before 4.0.38-3.47.4
spacewalk-backend-iss-export: before 4.0.38-3.47.4
spacewalk-backend-iss: before 4.0.38-3.47.4
spacewalk-backend-config-files-tool: before 4.0.38-3.47.4
spacewalk-backend-config-files-common: before 4.0.38-3.47.4
spacewalk-backend-config-files: before 4.0.38-3.47.4
spacewalk-backend-applet: before 4.0.38-3.47.4
spacewalk-backend-app: before 4.0.38-3.47.4
spacewalk-backend: before 4.0.38-3.47.4
python3-spacewalk-backend-libs: before 4.0.38-3.47.4
py27-compat-salt: before 3000.3-4.3.3
py26-compat-salt: before 2016.11.10-10.28.3
pxe-default-image-sle15: before 4.0.1-20210621145802
prometheus-exporters-formula: before 0.7.6-3.19.3
grafana-formula: before 0.2.3-4.16.3
susemanager-tools: before 4.0.34-3.52.3
susemanager: before 4.0.34-3.52.3
patterns-suma_server: before 4.0-9.19.3
patterns-suma_retail: before 4.0-9.19.3
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20212114-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.