The Gentoo net-im/jabberd2 package through 2.6.1 sets the ownership of /var/run/jabber to the jabber account, which might allow local users to kill arbitrary processes by leveraging access to this account for PID file modification before a root script executes a "kill -TERM `cat /var/run/jabber/filename.pid`" command.
References
Link | Resource |
---|---|
https://bugs.gentoo.org/631068 | Issue Tracking Third Party Advisory |
https://bugs.gentoo.org/631068 | Issue Tracking Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugs.gentoo.org/631068 - Issue Tracking, Third Party Advisory |
Information
Published : 2018-03-12 04:29
Updated : 2024-11-21 03:19
NVD link : CVE-2017-18226
Mitre link : CVE-2017-18226
CVE.ORG link : CVE-2017-18226
JSON object : View
Products Affected
gentoo
- linux
jabberd2
- jabberd2
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource