First published: Tue Dec 18 2018(Updated: )
JBoss EAP has a vulnerability that allows local users who are able to execute init.d script to terminate arbitrary process on the system. An attacker could exploit this by modifying the PID file in /var/run/jboss-eap/ allowing the init.d script to terminate any process as root.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Enterprise Application Platform |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1660263 is considered high due to the potential for local users to terminate arbitrary processes as root.
To fix REDHAT-BUG-1660263, apply the latest security patches provided by Red Hat for JBoss EAP.
Local users with access to execute init.d scripts on systems running affected versions of Red Hat JBoss EAP are at risk.
REDHAT-BUG-1660263 is a local privilege escalation vulnerability that allows termination of arbitrary processes.
No, REDHAT-BUG-1660263 requires local access to the system, making it a local vulnerability.