Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2011-1784

Опубликовано: 20 мая 2011
Источник: debian
EPSS Низкий

Описание

The pidfile_write function in core/pidfile.c in keepalived 1.2.2 and earlier uses 0666 permissions for the (1) keepalived.pid, (2) checkers.pid, and (3) vrrp.pid files in /var/run/, which allows local users to kill arbitrary processes by writing a PID to one of these files.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
keepalivedfixed1:1.2.2-2package
keepalivedno-dsalennypackage
keepalivedfixed1:1.1.20-1+squeeze1squeezepackage

EPSS

Процентиль: 14%
0.00047
Низкий

Связанные уязвимости

ubuntu
больше 14 лет назад

The pidfile_write function in core/pidfile.c in keepalived 1.2.2 and earlier uses 0666 permissions for the (1) keepalived.pid, (2) checkers.pid, and (3) vrrp.pid files in /var/run/, which allows local users to kill arbitrary processes by writing a PID to one of these files.

nvd
больше 14 лет назад

The pidfile_write function in core/pidfile.c in keepalived 1.2.2 and earlier uses 0666 permissions for the (1) keepalived.pid, (2) checkers.pid, and (3) vrrp.pid files in /var/run/, which allows local users to kill arbitrary processes by writing a PID to one of these files.

github
больше 3 лет назад

The pidfile_write function in core/pidfile.c in keepalived 1.2.2 and earlier uses 0666 permissions for the (1) keepalived.pid, (2) checkers.pid, and (3) vrrp.pid files in /var/run/, which allows local users to kill arbitrary processes by writing a PID to one of these files.

EPSS

Процентиль: 14%
0.00047
Низкий