[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2011-1784Date: (C)2011-05-20   (M)2023-12-22


The pidfile_write function in core/pidfile.c in keepalived 1.2.2 and earlier uses 0666 permissions for the (1) keepalived.pid, (2) checkers.pid, and (3) vrrp.pid files in /var/run/, which allows local users to kill arbitrary processes by writing a PID to one of these files.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 3.6
Exploit Score: 3.9
Impact Score: 4.9
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: LOW
Authentication: NONE
Confidentiality: NONE
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
SECUNIA-44460
BID-47859
OSVDB-72380
http://lists.debian.org/debian-security/2011/05/msg00013.html
http://lists.debian.org/debian-security/2011/05/msg00012.html
http://lists.debian.org/debian-security/2011/05/msg00018.html
http://openwall.com/lists/oss-security/2011/05/10/5
http://openwall.com/lists/oss-security/2011/05/16/7
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=626281
https://bugzilla.redhat.com/show_bug.cgi?id=704039
keepalived-pid-dos(67477)

CPE    1
cpe:/a:keepalived:keepalived
CWE    1
CWE-264
OVAL    2
oval:org.secpod.oval:def:104133
oval:org.secpod.oval:def:104132

© SecPod Technologies