First published: Sun Jul 30 2017(Updated: )
main.c in Tinyproxy 1.8.4 and earlier creates a /run/tinyproxy/tinyproxy.pid file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for tinyproxy.pid modification before a root script executes a "kill `cat /run/tinyproxy/tinyproxy.pid`" command.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tinyproxy | <=1.8.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11747 is classified as a medium severity vulnerability due to its potential impact on local user permissions.
To mitigate CVE-2017-11747, update Tinyproxy to version 1.8.5 or later, which addresses this issue.
CVE-2017-11747 is a privilege escalation vulnerability.
CVE-2017-11747 affects all versions of Tinyproxy up to and including 1.8.4.
An attacker can exploit CVE-2017-11747 to modify the tinyproxy.pid file and potentially kill arbitrary processes.