Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-3684

Опубликовано: 30 окт. 2014
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.8

Описание

The tm_adopt function in lib/Libifl/tm.c in Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) 5.0.x, 4.5.x, 4.2.x, and earlier does not validate that the owner of the process also owns the adopted session id, which allows remote authenticated users to kill arbitrary processes via a crafted executable.

РелизСтатусПримечание
artful

DNE

bionic

DNE

cosmic

DNE

devel

DNE

esm-apps/xenial

not-affected

2.4.16+dfsg-1.5
esm-infra-legacy/trusty

released

2.4.16+dfsg-1.3ubuntu1.1
lucid

ignored

end of life
precise

released

2.4.16+dfsg-1+deb7u4build0.12.04.1
precise/esm

DNE

precise was released [2.4.16+dfsg-1+deb7u4build0.12.04.1]
trusty

released

2.4.16+dfsg-1.3ubuntu1.1

Показывать по

EPSS

Процентиль: 85%
0.02532
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

nvd
больше 11 лет назад

The tm_adopt function in lib/Libifl/tm.c in Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) 5.0.x, 4.5.x, 4.2.x, and earlier does not validate that the owner of the process also owns the adopted session id, which allows remote authenticated users to kill arbitrary processes via a crafted executable.

debian
больше 11 лет назад

The tm_adopt function in lib/Libifl/tm.c in Terascale Open-Source Reso ...

github
больше 3 лет назад

The tm_adopt function in lib/Libifl/tm.c in Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) 5.0.x, 4.5.x, 4.2.x, and earlier does not validate that the owner of the process also owns the adopted session id, which allows remote authenticated users to kill arbitrary processes via a crafted executable.

EPSS

Процентиль: 85%
0.02532
Низкий

6.8 Medium

CVSS2