vulnerability
SUSE: CVE-2015-3243: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 2 | (AV:L/AC:L/Au:N/C:P/I:N/A:N) | Jul 25, 2017 | Jul 20, 2018 | Oct 22, 2021 |
Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
Jul 25, 2017
Added
Jul 20, 2018
Modified
Oct 22, 2021
Description
rsyslog uses weak permissions for generating log files, which allows local users to obtain sensitive information by reading files in /var/log/cron.
Solutions
suse-upgrade-rsyslogsuse-upgrade-rsyslog-diag-toolssuse-upgrade-rsyslog-docsuse-upgrade-rsyslog-module-dbisuse-upgrade-rsyslog-module-elasticsearchsuse-upgrade-rsyslog-module-gcryptsuse-upgrade-rsyslog-module-gssapisuse-upgrade-rsyslog-module-gtlssuse-upgrade-rsyslog-module-mmnormalizesuse-upgrade-rsyslog-module-mysqlsuse-upgrade-rsyslog-module-omamqp1suse-upgrade-rsyslog-module-omhttpfssuse-upgrade-rsyslog-module-omtclsuse-upgrade-rsyslog-module-pgsqlsuse-upgrade-rsyslog-module-relpsuse-upgrade-rsyslog-module-snmpsuse-upgrade-rsyslog-module-udpspoof
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.