Vulnerability Description
Tenshi 0.15 creates a tenshi.pid file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for tenshi.pid modification before a root script executes a "kill `cat /pathname/tenshi.pid`" command.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Inversepath | Tenshi | 0.15 |
Related Weaknesses (CWE)
References
- https://github.com/inversepath/tenshi/issues/6Third Party Advisory
- https://security.gentoo.org/glsa/201804-18
- https://github.com/inversepath/tenshi/issues/6Third Party Advisory
- https://security.gentoo.org/glsa/201804-18
FAQ
What is CVE-2017-11746?
CVE-2017-11746 is a vulnerability with a CVSS score of 7.5 (HIGH). Tenshi 0.15 creates a tenshi.pid file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for tensh...
How severe is CVE-2017-11746?
CVE-2017-11746 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-11746?
Check the references section above for vendor advisories and patch information. Affected products include: Inversepath Tenshi.