Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-14610

Опубликовано: 20 сент. 2017
Источник: debian
EPSS Низкий

Описание

bareos-dir, bareos-fd, and bareos-sd in bareos-core in Bareos 16.2.6 and earlier create a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
bareosremovedpackage
bareosignoredbusterpackage
bareosignoredstretchpackage
bareosno-dsajessiepackage

Примечания

  • https://bugs.bareos.org/view.php?id=847

EPSS

Процентиль: 13%
0.00043
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 8 лет назад

bareos-dir, bareos-fd, and bareos-sd in bareos-core in Bareos 16.2.6 and earlier create a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command.

CVSS3: 7.8
nvd
больше 8 лет назад

bareos-dir, bareos-fd, and bareos-sd in bareos-core in Bareos 16.2.6 and earlier create a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command.

EPSS

Процентиль: 13%
0.00043
Низкий