slapd in OpenLDAP 2.4.45 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command, as demonstrated by openldap-initscript.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T19:20:41.454Z
Reserved: 2017-09-05T00:00:00
Link: CVE-2017-14159

No data.

Status : Modified
Published: 2017-09-05T18:29:00.133
Modified: 2024-11-21T03:12:15.310
Link: CVE-2017-14159
