slapd in OpenLDAP 2.4.45 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command, as demonstrated by openldap-initscript.
References
Link Resource
http://www.openldap.org/its/index.cgi?findid=8703 Issue Tracking Mailing List Vendor Advisory
https://www.oracle.com/security-alerts/cpuapr2022.html Patch Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2017-09-05T18:00:00

Updated: 2022-04-19T23:19:14

Reserved: 2017-09-05T00:00:00


Link: CVE-2017-14159

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2017-09-05T18:29:00.133

Modified: 2022-06-13T19:18:13.177


Link: CVE-2017-14159

JSON object: View

cve-icon Redhat Information

No data.

CWE