First published: Fri Sep 01 2017(Updated: )
MIMEDefang 2.80 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command, as demonstrated by the init-script.in and mimedefang-init.in scripts.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MIMEDefang | =2.80 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14102 is classified as a high-severity vulnerability due to the potential for local users to terminate arbitrary processes.
To fix CVE-2017-14102, upgrade MIMEDefang to version 2.81 or later which addresses this vulnerability.
Users of MIMEDefang versions 2.80 and earlier are affected by CVE-2017-14102.
CVE-2017-14102 exploits the creation of a PID file after dropping privileges, allowing local users to modify it.
CVE-2017-14102 requires local access to the affected system to exploit the vulnerability.