CVE-2017-14730

moderate-risk
Published 2017-09-25

The init script in the Gentoo app-admin/logstash-bin package before 5.5.3 and 5.6.x before 5.6.1 has "chown -R" calls for user-writable directory trees, which allows local users to gain privileges by leveraging access to a $LS_USER account for creation of a hard link.

Do I need to act?

-
0.04% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10 High
LOCAL / LOW complexity

Affected Products (17)

Logstash
Logstash
Logstash
Logstash
Logstash
Logstash
Logstash
Logstash
Logstash
Logstash
Logstash
Logstash
Logstash
Logstash
Logstash
Logstash
Logstash

Affected Vendors

43
/ 100
moderate-risk
Severity 24/34 · High
Exploitability 0/34 · Minimal
Exposure 19/34 · Moderate