CVE-2017-14159

SOURCE - nist

Summary

slapd in OpenLDAP 2.4.45 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill cat /pathname" command, as demonstrated by openldap-initscript.

EPSS Score: 0.00043 (0.094)

Common Weakness Enumeration (CWE)

SOURCE - nist

Improper Initialization

SOURCE - redhat

Insecure Temporary File


debian

CREATED


UPDATED



EXPLOITABILITY SCORE

-


EXPLOITS FOUND
-

COMMON WEAKNESS ENUMERATION (CWE)-

CVSS SCORE

N/Alow
PackageTypeOS NameOS VersionAffected RangesFix Versions
debian/openldapdebdebian12>=2.5.13+dfsg-5Not yet available
debian/openldapdebdebian11>=2.4.57+dfsg-3+deb11u1Not yet available
debian/openldapdebdebian10>=2.4.47+dfsg-3+deb10u7Not yet available
debian/openldapdebdebian13>=2.5.17+dfsg-1Not yet available
debian/openldapdebdebianunstable>=2.5.17+dfsg-1Not yet available

Severity and metrics

No CVSS data available from this source.

nist

CREATED


UPDATED



EXPLOITABILITY SCORE

1


EXPLOITS FOUND
-

COMMON WEAKNESS ENUMERATION (CWE)

CVSS SCORE

4.7medium

alpine

CREATED


UPDATED



EXPLOITABILITY SCORE

-


EXPLOITS FOUND
-

COMMON WEAKNESS ENUMERATION (CWE)-
RATING UNAVAILABLE FROM SOURCE

ubuntu

CREATED


UPDATED



EXPLOITABILITY SCORE

1.0


EXPLOITS FOUND
-

COMMON WEAKNESS ENUMERATION (CWE)-

CVSS SCORE

4.7low

redhat

CREATED


UPDATED



EXPLOITABILITY SCORE

0.8


EXPLOITS FOUND
-

COMMON WEAKNESS ENUMERATION (CWE)

CVSS SCORE

4.4low