| ID |
CVE-2017-14681
|
| Sažetak |
The daemon in P3Scan 3.0_rc1 and earlier creates a p3scan.pid file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for p3scan.pid modification before a root script executes a "kill `cat /pathname/p3scan.pid`" command, as demonstrated by etc/init.d/p3scan. |
| Reference |
|
| CVSS |
| Base: | 2.1 |
| Impact: | 2.9 |
| Exploitability: | 3.9 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| LOCAL |
LOW |
NONE |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| NONE |
NONE |
PARTIAL |
|
| CVSS vektor |
AV:L/AC:L/Au:N/C:N/I:N/A:P |
| Zadnje važnije ažuriranje |
03-10-2019 - 00:03 |
| Objavljeno |
21-09-2017 - 23:29 |