Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-14609

Опубликовано: 20 сент. 2017
Источник: nvd
CVSS3: 7.8
CVSS2: 4.6
EPSS Низкий

Описание

The server daemons in Kannel 1.5.0 and earlier create a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill cat /pathname" command, as demonstrated by bearerbox.

Ссылки

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:kannel:kannel:*:*:*:*:*:*:*:*
Версия до 1.5.0 (включая)

EPSS

Процентиль: 16%
0.00051
Низкий

7.8 High

CVSS3

4.6 Medium

CVSS2

Дефекты

CWE-665

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 8 лет назад

The server daemons in Kannel 1.5.0 and earlier create a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command, as demonstrated by bearerbox.

CVSS3: 7.8
debian
больше 8 лет назад

The server daemons in Kannel 1.5.0 and earlier create a PID file after ...

CVSS3: 7.8
github
больше 3 лет назад

The server daemons in Kannel 1.5.0 and earlier create a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command, as demonstrated by bearerbox.

EPSS

Процентиль: 16%
0.00051
Низкий

7.8 High

CVSS3

4.6 Medium

CVSS2

Дефекты

CWE-665