CVE-2021-25321 – arpwatch: Local privilege escalation from runtime user to root
https://notcve.org/view.php?id=CVE-2021-25321
A UNIX Symbolic Link (Symlink) Following vulnerability in arpwatch of SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Manager Server 4.0, SUSE OpenStack Cloud Crowbar 9; openSUSE Factory, Leap 15.2 allows local attackers with control of the runtime user to run arpwatch as to escalate to root upon the next restart of arpwatch. This issue affects: SUSE Linux Enterprise Server 11-SP4-LTSS arpwatch versions prior to 2.1a15. SUSE Manager Server 4.0 arpwatch versions prior to 2.1a15. SUSE OpenStack Cloud Crowbar 9 arpwatch versions prior to 2.1a15. openSUSE Factory arpwatch version 2.1a15-169.5 and prior versions. openSUSE Leap 15.2 arpwatch version 2.1a15-lp152.5.5 and prior versions. Una vulnerabilidad de Seguimiento de Enlaces Simbólicos UNIX (Symlink) en arpwatch de SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Manager Server versión 4.0, SUSE OpenStack Cloud Crowbar versión 9; openSUSE Factory, Leap versión 15.2, permite a atacantes locales con control del usuario en runtime ejecutar arpwatch como escalar a root en el siguiente reinicio de arpwatch. • https://bugzilla.suse.com/show_bug.cgi?id=1186240 • CWE-61: UNIX Symbolic Link (Symlink) Following •
CVE-2012-2653
https://notcve.org/view.php?id=CVE-2012-2653
arpwatch 2.1a15, as used by Red Hat, Debian, Fedora, and possibly others, does not properly drop supplementary groups, which might allow attackers to gain root privileges by leveraging other vulnerabilities in the daemon. arpwatch v2.1a15, tal y como se usa en Red Hat, Debian, Fedora, y posiblemente otros, no libera correctamente los grupos complementarios, lo que podría permitir a un atacante obtener privilegios de superadministrador aprovechándose de otras vulnerabilidades en el demonio. • http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082553.html http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082565.html http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082569.html http://www.debian.org/security/2012/dsa-2481 http://www.mandriva.com/security/advisories?name=MDVSA-2012:113 http://www.openwall.com/lists/oss-security/2012/05/24/12 http://www.openwall.com/lists/oss-security/2012/05/24/13 http://www.openwall.com& •