CVE-2016-5759

The mkdumprd script called "dracut" in the current working directory "." allows local users to trick the administrator into executing code as root.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*

History

07 Nov 2023, 02:33

Type Values Removed Values Added
References (SUSE) http://lists.opensuse.org/opensuse-updates/2016-10/msg00083.html - Mailing List, Vendor Advisory () http://lists.opensuse.org/opensuse-updates/2016-10/msg00083.html -
References (MLIST) http://lists.suse.com/pipermail/sle-security-updates/2016-October/002337.html - Mailing List, Vendor Advisory () http://lists.suse.com/pipermail/sle-security-updates/2016-October/002337.html -

Information

Published : 2017-09-08 18:29

Updated : 2023-12-10 12:15


NVD link : CVE-2016-5759

Mitre link : CVE-2016-5759

CVE.ORG link : CVE-2016-5759


JSON object : View

Products Affected

novell

  • suse_linux_enterprise_desktop
  • suse_linux_enterprise_server

opensuse

  • leap
CWE
CWE-20

Improper Input Validation