Логотип exploitDog
bind:CVE-2017-13649
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-13649

Количество 3

Количество 3

nvd логотип

CVE-2017-13649

больше 8 лет назад

UnrealIRCd 4.0.13 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command. NOTE: the vendor indicates that there is no common or recommended scenario in which a root script would execute this kill command.

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2017-13649

больше 8 лет назад

UnrealIRCd 4.0.13 and earlier creates a PID file after dropping privil ...

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-p387-c589-x473

больше 3 лет назад

UnrealIRCd 4.0.13 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command. NOTE: the vendor indicates that there is no common or recommended scenario in which a root script would execute this kill command.

CVSS3: 5.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2017-13649

UnrealIRCd 4.0.13 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command. NOTE: the vendor indicates that there is no common or recommended scenario in which a root script would execute this kill command.

CVSS3: 5.5
0%
Низкий
больше 8 лет назад
debian логотип
CVE-2017-13649

UnrealIRCd 4.0.13 and earlier creates a PID file after dropping privil ...

CVSS3: 5.5
0%
Низкий
больше 8 лет назад
github логотип
GHSA-p387-c589-x473

UnrealIRCd 4.0.13 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command. NOTE: the vendor indicates that there is no common or recommended scenario in which a root script would execute this kill command.

CVSS3: 5.5
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу