First published: Fri Feb 16 2001(Updated: )
APC UPS daemon, apcupsd, saves its process ID in a world-writable file, which allows local users to kill an arbitrary process by specifying the target process ID in the apcupsd.pid file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apcupsd | =3.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0040 is considered a medium severity vulnerability due to its potential to allow local users to terminate arbitrary processes.
To fix CVE-2001-0040, ensure that the apcupsd.pid file is not world-writable by modifying its permissions appropriately.
CVE-2001-0040 specifically affects apcupsd version 3.7.2.
CVE-2001-0040 exploits the vulnerability by allowing local users to read the process ID from the world-writable apcupsd.pid file and kill the process.
CVE-2001-0040 is not a remote attack vulnerability; it requires local user access to exploit.