Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-3805

Опубликовано: 30 апр. 2019
Источник: redhat
CVSS3: 5.5
EPSS Низкий

Описание

A flaw was discovered in wildfly versions up to 16.0.0.Final that would allow local users who are able to execute init.d script to terminate arbitrary processes on the system. An attacker could exploit this by modifying the PID file in /var/run/jboss-eap/ allowing the init.d script to terminate any process as root.

A flaw was discovered in wildfly that would allow local users, who are able to execute init.d script, to terminate arbitrary processes on the system. An attacker could exploit this by modifying the PID file in /var/run/jboss-eap/ allowing the init.d script to terminate any process as root.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Decision Manager 7wildflyNot affected
Red Hat JBoss Data Virtualization 6jbossasOut of support scope
Red Hat JBoss Enterprise Application Platform 5jbossasNot affected
Red Hat JBoss Enterprise Application Platform 6jbossasWill not fix
Red Hat JBoss Fuse 6wildflyOut of support scope
Red Hat JBoss Fuse Service Works 6jbossasOut of support scope
Red Hat JBoss Operations Network 3wildflyNot affected
Red Hat JBoss SOA Platform 5jbossasNot affected
Red Hat OpenShift Application RuntimeswildflyNot affected
Red Hat Process Automation 7wildflyNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-364
https://bugzilla.redhat.com/show_bug.cgi?id=1660263wildfly: Race condition on PID file allows for termination of arbitrary processes by local users

EPSS

Процентиль: 13%
0.00042
Низкий

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.7
nvd
почти 7 лет назад

A flaw was discovered in wildfly versions up to 16.0.0.Final that would allow local users who are able to execute init.d script to terminate arbitrary processes on the system. An attacker could exploit this by modifying the PID file in /var/run/jboss-eap/ allowing the init.d script to terminate any process as root.

CVSS3: 4.7
debian
почти 7 лет назад

A flaw was discovered in wildfly versions up to 16.0.0.Final that woul ...

CVSS3: 4.7
github
больше 3 лет назад

A flaw was discovered in wildfly versions up to 16.0.0.Final that would allow local users who are able to execute init.d script to terminate arbitrary processes on the system. An attacker could exploit this by modifying the PID file in /var/run/jboss-eap/ allowing the init.d script to terminate any process as root.

CVSS3: 5.5
fstec
около 7 лет назад

Уязвимость Java-сервера приложений WildFly, вызванная ошибками синхронизации при использовании общего ресурса, позволяющая нарушителю завершать произвольные процессы в системе

EPSS

Процентиль: 13%
0.00042
Низкий

5.5 Medium

CVSS3

Уязвимость CVE-2019-3805