Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-7560

Опубликовано: 13 сент. 2017
Источник: debian
EPSS Низкий

Описание

It was found that rhnsd PID files are created as world-writable that allows local attackers to fill the disks or to kill selected processes.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
rhnsdnot-affectedpackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=1480550

  • Introduced by: https://github.com/spacewalkproject/spacewalk/commit/75d9c00b96ab430221c5c7668baebebc74ddd67e

EPSS

Процентиль: 29%
0.00106
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 8 лет назад

It was found that rhnsd PID files are created as world-writable that allows local attackers to fill the disks or to kill selected processes.

CVSS3: 5.5
redhat
больше 8 лет назад

It was found that rhnsd PID files are created as world-writable that allows local attackers to fill the disks or to kill selected processes.

CVSS3: 5.5
nvd
больше 8 лет назад

It was found that rhnsd PID files are created as world-writable that allows local attackers to fill the disks or to kill selected processes.

CVSS3: 5.5
github
больше 3 лет назад

It was found that rhnsd PID files are created as world-writable that allows local attackers to fill the disks or to kill selected processes.

EPSS

Процентиль: 29%
0.00106
Низкий