First published: Mon Jun 04 2018(Updated: )
The Gentoo app-backup/burp package before 2.1.32 sets the ownership of the PID file directory to the burp account, which might allow local users to kill arbitrary processes by leveraging access to this account for PID file modification before a root script sends a SIGKILL.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Burp Project Burp | <2.1.32 | |
Gentoo Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2017-18284.
The severity of CVE-2017-18284 is rated as high.
The affected software is Burp Project Burp package before version 2.1.32 on Gentoo Linux.
CVE-2017-18284 allows local users to kill arbitrary processes by leveraging access to the burp account for PID file modification.
Yes, you can find references for CVE-2017-18284 at the following links: [Gentoo Bug](https://bugs.gentoo.org/628770) and [Gentoo GLSA](https://security.gentoo.org/glsa/201806-03).