Description
A code injection in the supportconfig data collection tool in supportutils in SUSE Linux Enterprise Server 12 and 12-SP1 and SUSE Linux Enterprise Desktop 12 and 12-SP1 could be used by local attackers to execute code as the user running supportconfig (usually root).
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2016-2697 | A code injection in the supportconfig data collection tool in supportutils in SUSE Linux Enterprise Server 12 and 12-SP1 and SUSE Linux Enterprise Desktop 12 and 12-SP1 could be used by local attackers to execute code as the user running supportconfig (usually root). |
References
History
No history.
Status: PUBLISHED
Assigner: microfocus
Published:
Updated: 2024-08-05T23:02:12.144Z
Reserved: 2016-01-12T00:00:00.000Z
Link: CVE-2016-1602
No data.
Status : Modified
Published: 2017-03-23T06:59:00.173
Modified: 2026-05-13T00:24:29.033
Link: CVE-2016-1602
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD