Risk | Low |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2017-4932 CVE-2017-4931 CVE-2017-4930 |
CWE-ID | CWE-264 CWE-284 CWE-79 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Desktop Applications Module Operating systems & Components / Operating system SUSE Linux Enterprise Real Time 15 Operating systems & Components / Operating system openSUSE Leap Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 Operating systems & Components / Operating system SUSE Linux Enterprise Desktop 15 Operating systems & Components / Operating system mutter-lang Operating systems & Components / Operating system package or component mutter-debugsource Operating systems & Components / Operating system package or component mutter-devel Operating systems & Components / Operating system package or component mutter-debuginfo Operating systems & Components / Operating system package or component mutter Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU9175
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2017-4932
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to gain elevated privileges on the target system.
The weakness exists due to a flaw in the AirWatch Launcher for Android. A local attacker can gain privileged access to the system and perform arbitrary actions.
Update the affected package Recommended update for mutter to the latest version.
Vulnerable software versionsDesktop Applications Module: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
SUSE Linux Enterprise Desktop 15: SP6
mutter-lang: before 45.3-150600.5.9.1
mutter-debugsource: before 45.3-150600.5.9.1
mutter-devel: before 45.3-150600.5.9.1
mutter-debuginfo: before 45.3-150600.5.9.1
mutter: before 45.3-150600.5.9.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-ru-20242602-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU9174
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:U/U:Clear]
CVE-ID: CVE-2017-4931
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote authenticated attacker to modify log files on the target system.
The weakness exists due to a flaw in the AirWatch Console. A remote attacker can add data to the target enrolled device's CSV log files.
MitigationUpdate the affected package Recommended update for mutter to the latest version.
Vulnerable software versionsDesktop Applications Module: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
SUSE Linux Enterprise Desktop 15: SP6
mutter-lang: before 45.3-150600.5.9.1
mutter-debugsource: before 45.3-150600.5.9.1
mutter-devel: before 45.3-150600.5.9.1
mutter-debuginfo: before 45.3-150600.5.9.1
mutter: before 45.3-150600.5.9.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-ru-20242602-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU9173
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U/U:Clear]
CVE-ID: CVE-2017-4930
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionThe disclosed vulnerability allows a remote authenticated attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
MitigationUpdate the affected package Recommended update for mutter to the latest version.
Vulnerable software versionsDesktop Applications Module: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
SUSE Linux Enterprise Desktop 15: SP6
mutter-lang: before 45.3-150600.5.9.1
mutter-debugsource: before 45.3-150600.5.9.1
mutter-devel: before 45.3-150600.5.9.1
mutter-debuginfo: before 45.3-150600.5.9.1
mutter: before 45.3-150600.5.9.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-ru-20242602-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.