Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-3805

Опубликовано: 03 мая 2019
Источник: debian
EPSS Низкий

Описание

A flaw was discovered in wildfly versions up to 16.0.0.Final that would allow local users who are able to execute init.d script to terminate arbitrary processes on the system. An attacker could exploit this by modifying the PID file in /var/run/jboss-eap/ allowing the init.d script to terminate any process as root.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wildflyitppackage

EPSS

Процентиль: 13%
0.00042
Низкий

Связанные уязвимости

CVSS3: 5.5
redhat
почти 7 лет назад

A flaw was discovered in wildfly versions up to 16.0.0.Final that would allow local users who are able to execute init.d script to terminate arbitrary processes on the system. An attacker could exploit this by modifying the PID file in /var/run/jboss-eap/ allowing the init.d script to terminate any process as root.

CVSS3: 4.7
nvd
почти 7 лет назад

A flaw was discovered in wildfly versions up to 16.0.0.Final that would allow local users who are able to execute init.d script to terminate arbitrary processes on the system. An attacker could exploit this by modifying the PID file in /var/run/jboss-eap/ allowing the init.d script to terminate any process as root.

CVSS3: 4.7
github
больше 3 лет назад

A flaw was discovered in wildfly versions up to 16.0.0.Final that would allow local users who are able to execute init.d script to terminate arbitrary processes on the system. An attacker could exploit this by modifying the PID file in /var/run/jboss-eap/ allowing the init.d script to terminate any process as root.

CVSS3: 5.5
fstec
около 7 лет назад

Уязвимость Java-сервера приложений WildFly, вызванная ошибками синхронизации при использовании общего ресурса, позволяющая нарушителю завершать произвольные процессы в системе

EPSS

Процентиль: 13%
0.00042
Низкий