| ID |
CVE-2017-14609
|
| Sažetak |
The server daemons in Kannel 1.5.0 and earlier create a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command, as demonstrated by bearerbox. |
| Reference |
|
| CVSS |
| Base: | 4.6 |
| Impact: | 6.4 |
| Exploitability: | 3.9 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| LOCAL |
LOW |
NONE |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| PARTIAL |
PARTIAL |
PARTIAL |
|
| CVSS vektor |
AV:L/AC:L/Au:N/C:P/I:P/A:P |
| Zadnje važnije ažuriranje |
03-10-2019 - 00:03 |
| Objavljeno |
20-09-2017 - 18:29 |