Описание
It was found that rhnsd PID files are created as world-writable that allows local attackers to fill the disks or to kill selected processes.
Ссылки
- Issue TrackingThird Party AdvisoryVDB Entry
- Issue TrackingThird Party AdvisoryVDB Entry
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:redhat:rhnsd:-:*:*:*:*:*:*:*
EPSS
Процентиль: 29%
0.00106
Низкий
5.5 Medium
CVSS3
4.9 Medium
CVSS2
Дефекты
CWE-377
CWE-732
Связанные уязвимости
CVSS3: 5.5
ubuntu
больше 8 лет назад
It was found that rhnsd PID files are created as world-writable that allows local attackers to fill the disks or to kill selected processes.
CVSS3: 5.5
redhat
больше 8 лет назад
It was found that rhnsd PID files are created as world-writable that allows local attackers to fill the disks or to kill selected processes.
CVSS3: 5.5
debian
больше 8 лет назад
It was found that rhnsd PID files are created as world-writable that a ...
CVSS3: 5.5
github
больше 3 лет назад
It was found that rhnsd PID files are created as world-writable that allows local attackers to fill the disks or to kill selected processes.
EPSS
Процентиль: 29%
0.00106
Низкий
5.5 Medium
CVSS3
4.9 Medium
CVSS2
Дефекты
CWE-377
CWE-732