First published: Tue Sep 05 2017(Updated: )
slapd in OpenLDAP 2.4.45 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command, as demonstrated by openldap-initscript.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenLDAP | <=2.4.45 | |
oracle blockchain platform | <21.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14159 has been classified as a medium severity vulnerability.
To fix CVE-2017-14159, update OpenLDAP to version 2.4.46 or later.
CVE-2017-14159 affects OpenLDAP versions up to 2.4.45 and Oracle Blockchain Platform versions prior to 21.1.2.
Yes, local users can exploit CVE-2017-14159 to kill arbitrary processes using a non-root account.
CVE-2017-14159 is a local privilege escalation vulnerability.