5.5
CVSSv3

CVE-2017-11747

Published: 30/07/2017 Updated: 31/03/2020
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

main.c in Tinyproxy 1.8.4 and previous versions creates a /run/tinyproxy/tinyproxy.pid file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for tinyproxy.pid modification before a root script executes a "kill `cat /run/tinyproxy/tinyproxy.pid`" command.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

tinyproxy project tinyproxy

Vendor Advisories

Debian Bug report logs - #870307 tinyproxy: CVE-2017-11747: Creating PID file after privileges dropping allows local DoS Package: src:tinyproxy; Maintainer for src:tinyproxy is Mike Gabriel <sunweaver@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 31 Jul 2017 20:57:01 UTC Severity: norm ...