UnrealIRCd 4.0.13 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command. NOTE: the vendor indicates that there is no common or recommended scenario in which a root script would execute this kill command.
원문출처 : https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-13649
원문출처 : https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-13649
댓글 0
번호 | 제목 | 글쓴이 | 날짜 | 조회 수 |
---|---|---|---|---|
377 | CVE-2017-12112 | 관리자 | 2018.01.25 | 181 |
376 | CVE-2017-6331 | 관리자 | 2017.11.09 | 181 |
375 | CVE-2017-14100 | 관리자 | 2017.09.04 | 181 |
374 | CVE-2017-11424 | 관리자 | 2017.08.27 | 181 |
373 | CVE-2017-0117 | 관리자 | 2017.03.18 | 181 |
372 | CVE-2017-0082 | 관리자 | 2017.03.18 | 181 |
371 | CVE-2017-0020 | 관리자 | 2017.03.18 | 181 |
370 | CVE-2017-0015 | 관리자 | 2017.03.18 | 181 |
369 | CVE-2015-1142857 | 관리자 | 2018.01.25 | 180 |
368 | CVE-2017-12119 | 관리자 | 2018.01.25 | 180 |
367 | CVE-2017-14460 | 관리자 | 2018.01.25 | 180 |
366 | CVE-2017-14099 | 관리자 | 2017.09.04 | 180 |
365 | CVE-2014-7860 | 관리자 | 2017.08.27 | 180 |
364 | CVE-2017-13693 | 관리자 | 2017.08.27 | 180 |
363 | CVE-2017-0127 | 관리자 | 2017.03.18 | 180 |