vulnerability
SUSE: CVE-2015-3243: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
2 | (AV:L/AC:L/Au:N/C:P/I:N/A:N) | Jul 25, 2017 | Jul 20, 2018 | Oct 22, 2021 |
Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
Jul 25, 2017
Added
Jul 20, 2018
Modified
Oct 22, 2021
Description
rsyslog uses weak permissions for generating log files, which allows local users to obtain sensitive information by reading files in /var/log/cron.
Solution(s)
suse-upgrade-rsyslogsuse-upgrade-rsyslog-diag-toolssuse-upgrade-rsyslog-docsuse-upgrade-rsyslog-module-dbisuse-upgrade-rsyslog-module-elasticsearchsuse-upgrade-rsyslog-module-gcryptsuse-upgrade-rsyslog-module-gssapisuse-upgrade-rsyslog-module-gtlssuse-upgrade-rsyslog-module-mmnormalizesuse-upgrade-rsyslog-module-mysqlsuse-upgrade-rsyslog-module-omamqp1suse-upgrade-rsyslog-module-omhttpfssuse-upgrade-rsyslog-module-omtclsuse-upgrade-rsyslog-module-pgsqlsuse-upgrade-rsyslog-module-relpsuse-upgrade-rsyslog-module-snmpsuse-upgrade-rsyslog-module-udpspoof

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.