Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-11746

Опубликовано: 30 июл. 2017
Источник: debian
EPSS Низкий

Описание

Tenshi 0.15 creates a tenshi.pid file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for tenshi.pid modification before a root script executes a "kill `cat /pathname/tenshi.pid`" command.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tenshifixed0.13-2.1package
tenshifixed0.13-2.1~deb9u1stretchpackage

Примечания

  • https://github.com/inversepath/tenshi/issues/6

  • https://github.com/inversepath/tenshi/commit/d0e7f28c13ffbd5888b31d6532c2faf78f10f176

  • Negligible security impact

EPSS

Процентиль: 55%
0.00321
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 8 лет назад

Tenshi 0.15 creates a tenshi.pid file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for tenshi.pid modification before a root script executes a "kill `cat /pathname/tenshi.pid`" command.

CVSS3: 7.5
nvd
больше 8 лет назад

Tenshi 0.15 creates a tenshi.pid file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for tenshi.pid modification before a root script executes a "kill `cat /pathname/tenshi.pid`" command.

CVSS3: 7.5
github
больше 3 лет назад

Tenshi 0.15 creates a tenshi.pid file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for tenshi.pid modification before a root script executes a "kill `cat /pathname/tenshi.pid`" command.

EPSS

Процентиль: 55%
0.00321
Низкий