The pidfile_write function in core/pidfile.c in keepalived 1.2.2 and earlier uses 0666 permissions for the (1) keepalived.pid, (2) checkers.pid, and (3) vrrp.pid files in /var/run/, which allows local users to kill arbitrary processes by writing a PID to one of these files.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/67477 | vdb entry |
http://lists.debian.org/debian-security/2011/05/msg00018.html | mailing list |
http://lists.debian.org/debian-security/2011/05/msg00012.html | mailing list |
http://openwall.com/lists/oss-security/2011/05/10/5 | mailing list |
http://www.securityfocus.com/bid/47859 | vdb entry |
http://www.osvdb.org/72380 | vdb entry |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=626281 | |
http://secunia.com/advisories/44460 | third party advisory vendor advisory |
http://openwall.com/lists/oss-security/2011/05/16/7 | mailing list |
https://bugzilla.redhat.com/show_bug.cgi?id=704039 | |
http://lists.debian.org/debian-security/2011/05/msg00013.html | mailing list |