4.6
CVSSv2

CVE-2017-14610

Published: 20/09/2017 Updated: 03/10/2019
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 409
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

bareos-dir, bareos-fd, and bareos-sd in bareos-core in Bareos 16.2.6 and previous versions create a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command.

Vulnerable Product Search on Vulmon Subscribe to Product

bareos bareos

Vendor Advisories

Debian Bug report logs - #877334 CVE-2017-14610 Package: src:bareos; Maintainer for src:bareos is Bareos Packaging Team <team+bareos@trackerdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Sat, 30 Sep 2017 16:33:01 UTC Severity: important Tags: security Found in versions bareos/1421+20141017git ...