UBUNTU-CVE-2017-14610

Source
https://ubuntu.com/security/CVE-2017-14610
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-14610.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2017-14610
Related
Published
2017-09-20T18:29:00Z
Modified
2025-01-13T10:21:27Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

bareos-dir, bareos-fd, and bareos-sd in bareos-core in Bareos 16.2.6 and earlier create a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill cat /pathname" command.

References

Affected packages

Ubuntu:Pro:16.04:LTS / bareos

Package

Name
bareos
Purl
pkg:deb/ubuntu/bareos@14.2.6-3?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

14.*

14.2.5-1
14.2.5-2
14.2.6-1
14.2.6-2
14.2.6-2build1
14.2.6-3

Ecosystem specific

{
    "ubuntu_priority": "medium"
}