CVE-2017-14159

ADVISORY - debian

Summary

slapd in OpenLDAP 2.4.45 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill cat /pathname" command, as demonstrated by openldap-initscript.


EPSS Score: 0.00111 (0.309)

Common Weakness Enumeration (CWE)

ADVISORY - nist

Improper Initialization

ADVISORY - redhat

Insecure Temporary File


Debian

CREATED

UPDATED

EXPLOITABILITY SCORE

-

EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-

CVSS SCORE

N/Alow
PackageTypeOS NameOS VersionAffected RangesFix Versions
debian/openldapdebdebian12>=2.5.13+dfsg-5Not yet available
debian/openldapdebdebian11>=2.4.57+dfsg-3+deb11u1Not yet available
debian/openldapdebdebian13>=2.6.9+dfsg-2Not yet available
debian/openldapdebdebianunstable>=2.6.9+dfsg-2Not yet available

Severity and metrics

No CVSS data available from this advisory.

NIST

CREATED

UPDATED

EXPLOITABILITY SCORE

1

EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)

CVSS SCORE

4.7medium

Alpine

CREATED

UPDATED

EXPLOITABILITY SCORE

-

EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-
RATING UNAVAILABLE FROM ADVISORY

Ubuntu

CREATED

UPDATED

EXPLOITABILITY SCORE

1.0

EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-

CVSS SCORE

4.7low

Red Hat

CREATED

UPDATED

EXPLOITABILITY SCORE

0.8

EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)

CVSS SCORE

4.4low