Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2016-1247 |
CWE-ID | CWE-264 |
Exploitation vector | Local |
Public exploit | Public exploit code for vulnerability #1 is available. |
Vulnerable software |
SUSE Linux Enterprise Micro Operating systems & Components / Operating system sssd-krb5-common Operating systems & Components / Operating system package or component libsss_certmap0-debuginfo Operating systems & Components / Operating system package or component sssd-ldap-debuginfo Operating systems & Components / Operating system package or component libsss_certmap0 Operating systems & Components / Operating system package or component libsss_nss_idmap0-debuginfo Operating systems & Components / Operating system package or component sssd-ldap Operating systems & Components / Operating system package or component sssd-common Operating systems & Components / Operating system package or component sssd Operating systems & Components / Operating system package or component libsss_idmap0 Operating systems & Components / Operating system package or component sssd-krb5-common-debuginfo Operating systems & Components / Operating system package or component libsss_nss_idmap0 Operating systems & Components / Operating system package or component sssd-debugsource Operating systems & Components / Operating system package or component sssd-common-debuginfo Operating systems & Components / Operating system package or component libsss_idmap0-debuginfo Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU1082
Risk: Low
CVSSv4.0: 7.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2016-1247
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to gain elevated privileges on the target system.
The weakness is due to improper handling of log file permissions in the '/var/log/nginx' directory by nginx packages. A locall attacker with 'www-data' user privileges can obtain root privileges on the target system.
Successful exploitation of the vulnerability results in privilege escalation on the vulnerable system.
Update the affected package Recommended update for sssd to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
sssd-krb5-common: All versions
libsss_certmap0-debuginfo: All versions
sssd-ldap-debuginfo: All versions
libsss_certmap0: All versions
libsss_nss_idmap0-debuginfo: All versions
sssd-ldap: All versions
sssd-common: All versions
sssd: All versions
libsss_idmap0: All versions
sssd-krb5-common-debuginfo: All versions
libsss_nss_idmap0: All versions
sssd-debugsource: All versions
sssd-common-debuginfo: All versions
libsss_idmap0-debuginfo: All versions
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-ru-20241993-2/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.