CVE-2017-14609
20.09.2017, 18:29
The server daemons in Kannel 1.5.0 and earlier create a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command, as demonstrated by bearerbox.Enginsight
Vendor | Product | Version |
---|---|---|
kannel | kannel | 𝑥 ≤ 1.5.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration