Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-7560

Опубликовано: 13 сент. 2017
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4.9
CVSS3: 5.5

Описание

It was found that rhnsd PID files are created as world-writable that allows local attackers to fill the disks or to kill selected processes.

РелизСтатусПримечание
artful

ignored

end of life
bionic

DNE

cosmic

DNE

devel

DNE

esm-apps/xenial

not-affected

code not present
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [code not present]]
precise/esm

DNE

trusty

not-affected

code not present
trusty/esm

DNE

trusty was not-affected [code not present]
upstream

needs-triage

Показывать по

EPSS

Процентиль: 29%
0.00106
Низкий

4.9 Medium

CVSS2

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
redhat
больше 8 лет назад

It was found that rhnsd PID files are created as world-writable that allows local attackers to fill the disks or to kill selected processes.

CVSS3: 5.5
nvd
больше 8 лет назад

It was found that rhnsd PID files are created as world-writable that allows local attackers to fill the disks or to kill selected processes.

CVSS3: 5.5
debian
больше 8 лет назад

It was found that rhnsd PID files are created as world-writable that a ...

CVSS3: 5.5
github
больше 3 лет назад

It was found that rhnsd PID files are created as world-writable that allows local attackers to fill the disks or to kill selected processes.

EPSS

Процентиль: 29%
0.00106
Низкий

4.9 Medium

CVSS2

5.5 Medium

CVSS3