It was found that rhnsd PID files are created as world-writable that allows local attackers to fill the disks or to kill selected processes.
Creating and using insecure temporary files can leave application and system data vulnerable to attack.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1480550 | third party advisory vdb entry issue tracking |