Vulnerability Description
The daemon in P3Scan 3.0_rc1 and earlier creates a p3scan.pid file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for p3scan.pid modification before a root script executes a "kill `cat /pathname/p3scan.pid`" command, as demonstrated by etc/init.d/p3scan.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| P3Scan Project | P3Scan | <= 3.0 |
Related Weaknesses (CWE)
References
- https://sourceforge.net/p/p3scan/bugs/33/MitigationThird Party Advisory
- https://sourceforge.net/p/p3scan/bugs/33/MitigationThird Party Advisory
FAQ
What is CVE-2017-14681?
CVE-2017-14681 is a vulnerability with a CVSS score of 5.5 (MEDIUM). The daemon in P3Scan 3.0_rc1 and earlier creates a p3scan.pid file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to th...
How severe is CVE-2017-14681?
CVE-2017-14681 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-14681?
Check the references section above for vendor advisories and patch information. Affected products include: P3Scan Project P3Scan.