Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-11746

Опубликовано: 30 июл. 2017
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.8
CVSS3: 7.5

Описание

Tenshi 0.15 creates a tenshi.pid file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for tenshi.pid modification before a root script executes a "kill cat /pathname/tenshi.pid" command.

РелизСтатусПримечание
devel

not-affected

0.13-2+deb7u1
esm-apps/xenial

released

0.13-2+deb7u1~build0.16.04.1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [0.13-2+deb7u1~build0.14.04.1]]
precise/esm

DNE

trusty

released

0.13-2+deb7u1~build0.14.04.1
trusty/esm

DNE

trusty was released [0.13-2+deb7u1~build0.14.04.1]
upstream

released

0.13-2+deb7u1
vivid/ubuntu-core

DNE

xenial

released

0.13-2+deb7u1~build0.16.04.1
zesty

released

0.13-2+deb7u1~build0.17.04.1

Показывать по

EPSS

Процентиль: 55%
0.00321
Низкий

7.8 High

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
больше 8 лет назад

Tenshi 0.15 creates a tenshi.pid file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for tenshi.pid modification before a root script executes a "kill `cat /pathname/tenshi.pid`" command.

CVSS3: 7.5
debian
больше 8 лет назад

Tenshi 0.15 creates a tenshi.pid file after dropping privileges to a n ...

CVSS3: 7.5
github
больше 3 лет назад

Tenshi 0.15 creates a tenshi.pid file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for tenshi.pid modification before a root script executes a "kill `cat /pathname/tenshi.pid`" command.

EPSS

Процентиль: 55%
0.00321
Низкий

7.8 High

CVSS2

7.5 High

CVSS3