First published: Mon Mar 12 2018(Updated: )
The Gentoo net-im/jabberd2 package through 2.6.1 sets the ownership of /var/run/jabber to the jabber account, which might allow local users to kill arbitrary processes by leveraging access to this account for PID file modification before a root script executes a "kill -TERM `cat /var/run/jabber/filename.pid`" command.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jabberd2 Jabberd2 | <=2.6.1 | |
Gentoo Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2017-18226.
The severity of CVE-2017-18226 is medium (5.5).
The Gentoo net-im/jabberd2 package through 2.6.1 is affected by CVE-2017-18226.
CVE-2017-18226 allows local users to kill arbitrary processes by leveraging access to the jabber account for PID file modification.
No, Gentoo Linux is not affected by CVE-2017-18226.