Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 4 |
CVE-ID | CVE-2022-32149 CVE-2022-41723 CVE-2022-46146 CVE-2023-29409 |
CWE-ID | CWE-400 CWE-836 CWE-295 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
SUSE Manager Client Tools for SLE Operating systems & Components / Operating system SUSE Linux Enterprise Server for the Raspberry Pi Operating systems & Components / Operating system SUSE Linux Enterprise Desktop 12 Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 12 Operating systems & Components / Operating system SUSE Linux Enterprise Server 12 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 12 Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications Operating systems & Components / Operating system SUSE Linux Enterprise Server Operating systems & Components / Operating system SUSE Linux Enterprise Desktop Operating systems & Components / Operating system supportutils-plugin-susemanager-client Operating systems & Components / Operating system package or component spacecmd Operating systems & Components / Operating system package or component grafana Operating systems & Components / Operating system package or component python2-uyuni-common-libs Operating systems & Components / Operating system package or component prometheus-blackbox_exporter Operating systems & Components / Operating system package or component golang-github-lusitaniae-apache_exporter Operating systems & Components / Operating system package or component golang-github-prometheus-prometheus Operating systems & Components / Operating system package or component prometheus-postgres_exporter Operating systems & Components / Operating system package or component golang-github-prometheus-node_exporter Operating systems & Components / Operating system package or component golang-github-prometheus-alertmanager Operating systems & Components / Operating system package or component prometheus-blackbox_exporter-debuginfo Operating systems & Components / Operating system package or component golang-github-QubitProducts-exporter_exporter Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU68897
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-32149
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to ParseAcceptLanguage does not properly control consumption of internal resources. A remote attacker can send a specially crafted Accept-Language header that will take a significant time to parse and perform a denial of service (DoS) attack.
MitigationUpdate the affected package SUSE Manager Client Tools to the latest version.
Vulnerable software versionsSUSE Manager Client Tools for SLE: 12
SUSE Linux Enterprise Server for the Raspberry Pi: 12-SP2
SUSE Linux Enterprise Desktop 12: SP1 - SP4
SUSE Linux Enterprise Server for SAP Applications 12: SP1 - SP5
SUSE Linux Enterprise Server 12: SP1 - SP5
SUSE Linux Enterprise High Performance Computing 12: SP2 - SP5
SUSE Linux Enterprise Server for SAP Applications: 12-SP4
SUSE Linux Enterprise Server: 12-SP2-LTSS-ERICSSON
SUSE Linux Enterprise Desktop: 12-SP5
supportutils-plugin-susemanager-client: before 4.3.3-6.27.2
spacecmd: before 4.3.23-38.127.3
grafana: before 9.5.5-1.54.3
python2-uyuni-common-libs: before 4.3.9-1.36.3
prometheus-blackbox_exporter: before 0.24.0-1.23.2
golang-github-lusitaniae-apache_exporter: before 1.0.0-1.18.2
golang-github-prometheus-prometheus: before 2.45.0-1.47.3
prometheus-postgres_exporter: before 0.10.1-1.14.3
golang-github-prometheus-node_exporter: before 1.5.0-1.27.2
golang-github-prometheus-alertmanager: before 0.23.0-1.21.2
prometheus-blackbox_exporter-debuginfo: before 0.24.0-1.23.2
golang-github-QubitProducts-exporter_exporter: before 0.4.0-1.12.2
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20233867-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU72686
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-41723
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources in the HPACK decoder. A remote attacker can send a specially crafted HTTP/2 stream to the application, cause resource exhaustion and perform a denial of service (DoS) attack.
MitigationUpdate the affected package SUSE Manager Client Tools to the latest version.
Vulnerable software versionsSUSE Manager Client Tools for SLE: 12
SUSE Linux Enterprise Server for the Raspberry Pi: 12-SP2
SUSE Linux Enterprise Desktop 12: SP1 - SP4
SUSE Linux Enterprise Server for SAP Applications 12: SP1 - SP5
SUSE Linux Enterprise Server 12: SP1 - SP5
SUSE Linux Enterprise High Performance Computing 12: SP2 - SP5
SUSE Linux Enterprise Server for SAP Applications: 12-SP4
SUSE Linux Enterprise Server: 12-SP2-LTSS-ERICSSON
SUSE Linux Enterprise Desktop: 12-SP5
supportutils-plugin-susemanager-client: before 4.3.3-6.27.2
spacecmd: before 4.3.23-38.127.3
grafana: before 9.5.5-1.54.3
python2-uyuni-common-libs: before 4.3.9-1.36.3
prometheus-blackbox_exporter: before 0.24.0-1.23.2
golang-github-lusitaniae-apache_exporter: before 1.0.0-1.18.2
golang-github-prometheus-prometheus: before 2.45.0-1.47.3
prometheus-postgres_exporter: before 0.10.1-1.14.3
golang-github-prometheus-node_exporter: before 1.5.0-1.27.2
golang-github-prometheus-alertmanager: before 0.23.0-1.21.2
prometheus-blackbox_exporter-debuginfo: before 0.24.0-1.23.2
golang-github-QubitProducts-exporter_exporter: before 0.4.0-1.12.2
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20233867-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU69691
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-46146
CWE-ID:
CWE-836 - Use of Password Hash Instead of Password for Authentication
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to incorrect implementation of basic authentication. A remote attacker with knowledge of the password hash can authenticate against Prometheus without actual knowledge of the password.
Update the affected package SUSE Manager Client Tools to the latest version.
Vulnerable software versionsSUSE Manager Client Tools for SLE: 12
SUSE Linux Enterprise Server for the Raspberry Pi: 12-SP2
SUSE Linux Enterprise Desktop 12: SP1 - SP4
SUSE Linux Enterprise Server for SAP Applications 12: SP1 - SP5
SUSE Linux Enterprise Server 12: SP1 - SP5
SUSE Linux Enterprise High Performance Computing 12: SP2 - SP5
SUSE Linux Enterprise Server for SAP Applications: 12-SP4
SUSE Linux Enterprise Server: 12-SP2-LTSS-ERICSSON
SUSE Linux Enterprise Desktop: 12-SP5
supportutils-plugin-susemanager-client: before 4.3.3-6.27.2
spacecmd: before 4.3.23-38.127.3
grafana: before 9.5.5-1.54.3
python2-uyuni-common-libs: before 4.3.9-1.36.3
prometheus-blackbox_exporter: before 0.24.0-1.23.2
golang-github-lusitaniae-apache_exporter: before 1.0.0-1.18.2
golang-github-prometheus-prometheus: before 2.45.0-1.47.3
prometheus-postgres_exporter: before 0.10.1-1.14.3
golang-github-prometheus-node_exporter: before 1.5.0-1.27.2
golang-github-prometheus-alertmanager: before 0.23.0-1.21.2
prometheus-blackbox_exporter-debuginfo: before 0.24.0-1.23.2
golang-github-QubitProducts-exporter_exporter: before 0.4.0-1.12.2
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20233867-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU78913
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-29409
CWE-ID:
CWE-295 - Improper Certificate Validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to verifying certificate chains containing large RSA keys is slow. A remote attacker can cause a client/server to expend significant CPU time verifying signatures.
MitigationUpdate the affected package SUSE Manager Client Tools to the latest version.
Vulnerable software versionsSUSE Manager Client Tools for SLE: 12
SUSE Linux Enterprise Server for the Raspberry Pi: 12-SP2
SUSE Linux Enterprise Desktop 12: SP1 - SP4
SUSE Linux Enterprise Server for SAP Applications 12: SP1 - SP5
SUSE Linux Enterprise Server 12: SP1 - SP5
SUSE Linux Enterprise High Performance Computing 12: SP2 - SP5
SUSE Linux Enterprise Server for SAP Applications: 12-SP4
SUSE Linux Enterprise Server: 12-SP2-LTSS-ERICSSON
SUSE Linux Enterprise Desktop: 12-SP5
supportutils-plugin-susemanager-client: before 4.3.3-6.27.2
spacecmd: before 4.3.23-38.127.3
grafana: before 9.5.5-1.54.3
python2-uyuni-common-libs: before 4.3.9-1.36.3
prometheus-blackbox_exporter: before 0.24.0-1.23.2
golang-github-lusitaniae-apache_exporter: before 1.0.0-1.18.2
golang-github-prometheus-prometheus: before 2.45.0-1.47.3
prometheus-postgres_exporter: before 0.10.1-1.14.3
golang-github-prometheus-node_exporter: before 1.5.0-1.27.2
golang-github-prometheus-alertmanager: before 0.23.0-1.21.2
prometheus-blackbox_exporter-debuginfo: before 0.24.0-1.23.2
golang-github-QubitProducts-exporter_exporter: before 0.4.0-1.12.2
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20233867-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.