Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-14609

Опубликовано: 20 сент. 2017
Источник: debian
EPSS Низкий

Описание

The server daemons in Kannel 1.5.0 and earlier create a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command, as demonstrated by bearerbox.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
kannelnot-affectedpackage

Примечания

  • https://redmine.kannel.org/issues/771

EPSS

Процентиль: 16%
0.00051
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 8 лет назад

The server daemons in Kannel 1.5.0 and earlier create a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command, as demonstrated by bearerbox.

CVSS3: 7.8
nvd
больше 8 лет назад

The server daemons in Kannel 1.5.0 and earlier create a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command, as demonstrated by bearerbox.

CVSS3: 7.8
github
больше 3 лет назад

The server daemons in Kannel 1.5.0 and earlier create a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command, as demonstrated by bearerbox.

EPSS

Процентиль: 16%
0.00051
Низкий