Vulnerability Details : CVE-2017-18284
The Gentoo app-backup/burp package before 2.1.32 sets the ownership of the PID file directory to the burp account, which might allow local users to kill arbitrary processes by leveraging access to this account for PID file modification before a root script sends a SIGKILL.
Products affected by CVE-2017-18284
- cpe:2.3:a:burp_project:burp:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-18284
0.03%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-18284
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.6
|
LOW | AV:L/AC:L/Au:N/C:N/I:P/A:P |
3.9
|
4.9
|
NIST | |
7.1
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
1.8
|
5.2
|
NIST |
CWE ids for CVE-2017-18284
-
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-18284
-
https://security.gentoo.org/glsa/201806-03
BURP: Multiple vulnerabilities (GLSA 201806-03) — Gentoo securityVendor Advisory
-
https://bugs.gentoo.org/628770
628770 – (CVE-2017-18284) <app-backup/burp-2.1.32: privilege escalation via PID file manipulationIssue Tracking;Third Party Advisory
Jump to