Upstream information

CVE-2019-18862 at MITRE

Description

maidag in GNU Mailutils before 3.8 is installed setuid and allows local privilege escalation in the url mode.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4.6
Vector AV:L/AC:L/Au:N/C:P/I:P/A:P
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
CVSS v3 Scores
  National Vulnerability Database
Base Score 7.8
Vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector Local
Attack Complexity Low
Privileges Required Low
User Interaction None
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
CVSSv3 Version 3.1
SUSE Bugzilla entry: 1156495 [RESOLVED / INVALID]

No SUSE Security Announcements cross referenced.

List of released packages

Product(s) Fixed package version(s) References
openSUSE Tumbleweed
  • libmailutils5 >= 3.8-8.8
  • mailutils >= 3.8-8.8
  • mailutils-devel >= 3.8-8.8
  • mailutils-imap4d >= 3.8-8.8
  • mailutils-mh >= 3.8-8.8
  • mailutils-notify >= 3.8-8.8
  • mailutils-pop3d >= 3.8-8.8
Patchnames:
openSUSE-Tumbleweed-2024-11035


SUSE Timeline for this CVE

CVE page created: Mon Nov 11 21:22:04 2019
CVE page last modified: Tue Sep 3 19:14:36 2024