Risk | High |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2015-20107 CVE-2018-25032 |
CWE-ID | CWE-78 CWE-119 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
SUSE Linux Enterprise Desktop Operating systems & Components / Operating system openSUSE Leap Operating systems & Components / Operating system SUSE Manager Server Operating systems & Components / Operating system SUSE Manager Proxy Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications Operating systems & Components / Operating system SUSE Linux Enterprise Server Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing Operating systems & Components / Operating system SUSE Linux Enterprise Module for Development Tools Operating systems & Components / Operating system SUSE Linux Enterprise Module for Basesystem Operating systems & Components / Operating system python39-base-32bit-debuginfo Operating systems & Components / Operating system package or component python39-base-32bit Operating systems & Components / Operating system package or component python39-32bit-debuginfo Operating systems & Components / Operating system package or component python39-32bit Operating systems & Components / Operating system package or component libpython3_9-1_0-32bit-debuginfo Operating systems & Components / Operating system package or component libpython3_9-1_0-32bit Operating systems & Components / Operating system package or component python39-tools Operating systems & Components / Operating system package or component python39-tk-debuginfo Operating systems & Components / Operating system package or component python39-tk Operating systems & Components / Operating system package or component python39-testsuite-debuginfo Operating systems & Components / Operating system package or component python39-testsuite Operating systems & Components / Operating system package or component python39-idle Operating systems & Components / Operating system package or component python39-doc-devhelp Operating systems & Components / Operating system package or component python39-doc Operating systems & Components / Operating system package or component python39-devel Operating systems & Components / Operating system package or component python39-debugsource Operating systems & Components / Operating system package or component python39-debuginfo Operating systems & Components / Operating system package or component python39-dbm-debuginfo Operating systems & Components / Operating system package or component python39-dbm Operating systems & Components / Operating system package or component python39-curses-debuginfo Operating systems & Components / Operating system package or component python39-curses Operating systems & Components / Operating system package or component python39-core-debugsource Operating systems & Components / Operating system package or component python39-base-debuginfo Operating systems & Components / Operating system package or component python39-base Operating systems & Components / Operating system package or component python39 Operating systems & Components / Operating system package or component libpython3_9-1_0-debuginfo Operating systems & Components / Operating system package or component libpython3_9-1_0 Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU64573
Risk: High
CVSSv4.0: 7.2 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2015-20107
CWE-ID:
CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to improper input validation in the mailcap module, which does not escape characters into commands discovered in the system mailcap file. A remote unauthenticated attacker can pass specially crafted data to the applications that call mailcap.findmatch with untrusted input and execute arbitrary OS commands on the target system.
Update the affected package python39 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Desktop: 15-SP3
openSUSE Leap: 15.3 - 15.4
SUSE Manager Server: 4.2
SUSE Manager Proxy: 4.2
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Server: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-SP3
SUSE Linux Enterprise Module for Development Tools: 15-SP3
SUSE Linux Enterprise Module for Basesystem: 15-SP3
python39-base-32bit-debuginfo: before 3.9.13-150300.4.13.1
python39-base-32bit: before 3.9.13-150300.4.13.1
python39-32bit-debuginfo: before 3.9.13-150300.4.13.1
python39-32bit: before 3.9.13-150300.4.13.1
libpython3_9-1_0-32bit-debuginfo: before 3.9.13-150300.4.13.1
libpython3_9-1_0-32bit: before 3.9.13-150300.4.13.1
python39-tools: before 3.9.13-150300.4.13.1
python39-tk-debuginfo: before 3.9.13-150300.4.13.1
python39-tk: before 3.9.13-150300.4.13.1
python39-testsuite-debuginfo: before 3.9.13-150300.4.13.1
python39-testsuite: before 3.9.13-150300.4.13.1
python39-idle: before 3.9.13-150300.4.13.1
python39-doc-devhelp: before 3.9.13-150300.4.13.1
python39-doc: before 3.9.13-150300.4.13.1
python39-devel: before 3.9.13-150300.4.13.1
python39-debugsource: before 3.9.13-150300.4.13.1
python39-debuginfo: before 3.9.13-150300.4.13.1
python39-dbm-debuginfo: before 3.9.13-150300.4.13.1
python39-dbm: before 3.9.13-150300.4.13.1
python39-curses-debuginfo: before 3.9.13-150300.4.13.1
python39-curses: before 3.9.13-150300.4.13.1
python39-core-debugsource: before 3.9.13-150300.4.13.1
python39-base-debuginfo: before 3.9.13-150300.4.13.1
python39-base: before 3.9.13-150300.4.13.1
python39: before 3.9.13-150300.4.13.1
libpython3_9-1_0-debuginfo: before 3.9.13-150300.4.13.1
libpython3_9-1_0: before 3.9.13-150300.4.13.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222174-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61671
Risk: Medium
CVSSv4.0: 2.1 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-25032
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when compressing data. A remote attacker can pass specially crafted input to the application, trigger memory corruption and perform a denial of service (DoS) attack.
MitigationUpdate the affected package python39 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Desktop: 15-SP3
openSUSE Leap: 15.3 - 15.4
SUSE Manager Server: 4.2
SUSE Manager Proxy: 4.2
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Server: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-SP3
SUSE Linux Enterprise Module for Development Tools: 15-SP3
SUSE Linux Enterprise Module for Basesystem: 15-SP3
python39-base-32bit-debuginfo: before 3.9.13-150300.4.13.1
python39-base-32bit: before 3.9.13-150300.4.13.1
python39-32bit-debuginfo: before 3.9.13-150300.4.13.1
python39-32bit: before 3.9.13-150300.4.13.1
libpython3_9-1_0-32bit-debuginfo: before 3.9.13-150300.4.13.1
libpython3_9-1_0-32bit: before 3.9.13-150300.4.13.1
python39-tools: before 3.9.13-150300.4.13.1
python39-tk-debuginfo: before 3.9.13-150300.4.13.1
python39-tk: before 3.9.13-150300.4.13.1
python39-testsuite-debuginfo: before 3.9.13-150300.4.13.1
python39-testsuite: before 3.9.13-150300.4.13.1
python39-idle: before 3.9.13-150300.4.13.1
python39-doc-devhelp: before 3.9.13-150300.4.13.1
python39-doc: before 3.9.13-150300.4.13.1
python39-devel: before 3.9.13-150300.4.13.1
python39-debugsource: before 3.9.13-150300.4.13.1
python39-debuginfo: before 3.9.13-150300.4.13.1
python39-dbm-debuginfo: before 3.9.13-150300.4.13.1
python39-dbm: before 3.9.13-150300.4.13.1
python39-curses-debuginfo: before 3.9.13-150300.4.13.1
python39-curses: before 3.9.13-150300.4.13.1
python39-core-debugsource: before 3.9.13-150300.4.13.1
python39-base-debuginfo: before 3.9.13-150300.4.13.1
python39-base: before 3.9.13-150300.4.13.1
python39: before 3.9.13-150300.4.13.1
libpython3_9-1_0-debuginfo: before 3.9.13-150300.4.13.1
libpython3_9-1_0: before 3.9.13-150300.4.13.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222174-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.