vulnerability

SUSE: CVE-2015-3243: SUSE Linux Security Advisory

Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
Jul 25, 2017
Added
Jul 20, 2018
Modified
Oct 22, 2021

Description

rsyslog uses weak permissions for generating log files, which allows local users to obtain sensitive information by reading files in /var/log/cron.

Solution(s)

suse-upgrade-rsyslogsuse-upgrade-rsyslog-diag-toolssuse-upgrade-rsyslog-docsuse-upgrade-rsyslog-module-dbisuse-upgrade-rsyslog-module-elasticsearchsuse-upgrade-rsyslog-module-gcryptsuse-upgrade-rsyslog-module-gssapisuse-upgrade-rsyslog-module-gtlssuse-upgrade-rsyslog-module-mmnormalizesuse-upgrade-rsyslog-module-mysqlsuse-upgrade-rsyslog-module-omamqp1suse-upgrade-rsyslog-module-omhttpfssuse-upgrade-rsyslog-module-omtclsuse-upgrade-rsyslog-module-pgsqlsuse-upgrade-rsyslog-module-relpsuse-upgrade-rsyslog-module-snmpsuse-upgrade-rsyslog-module-udpspoof
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.