Описание
slapd in OpenLDAP 2.4.45 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill cat /pathname
" command, as demonstrated by openldap-initscript.
Ссылки
- Issue TrackingMailing ListVendor Advisory
- PatchThird Party Advisory
- Issue TrackingMailing ListVendor Advisory
- PatchThird Party Advisory
Уязвимые конфигурации
EPSS
4.7 Medium
CVSS3
1.9 Low
CVSS2
Дефекты
Связанные уязвимости
slapd in OpenLDAP 2.4.45 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command, as demonstrated by openldap-initscript.
slapd in OpenLDAP 2.4.45 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command, as demonstrated by openldap-initscript.
slapd in OpenLDAP 2.4.45 and earlier creates a PID file after dropping ...
slapd in OpenLDAP 2.4.45 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command, as demonstrated by openldap-initscript.
EPSS
4.7 Medium
CVSS3
1.9 Low
CVSS2