First published: Tue Sep 05 2017(Updated: )
slapd in OpenLDAP 2.4.45 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command, as demonstrated by openldap-initscript.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openldap Openldap | <=2.4.45 | |
Oracle Blockchain Platform | <21.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.