CVE-2016-1602

A code injection in the supportconfig data collection tool in supportutils in SUSE Linux Enterprise Server 12 and 12-SP1 and SUSE Linux Enterprise Desktop 12 and 12-SP1 could be used by local attackers to execute code as the user running supportconfig (usually root).
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*

History

07 Nov 2023, 02:30

Type Values Removed Values Added
References (CONFIRM) http://lists.suse.com/pipermail/sle-security-updates/2016-June/002096.html - Vendor Advisory () http://lists.suse.com/pipermail/sle-security-updates/2016-June/002096.html -

Information

Published : 2017-03-23 06:59

Updated : 2023-12-10 12:01


NVD link : CVE-2016-1602

Mitre link : CVE-2016-1602

CVE.ORG link : CVE-2016-1602


JSON object : View

Products Affected

suse

  • suse_linux_enterprise_server
  • linux_enterprise_server
  • linux_enterprise_desktop
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')