CVE-2017-14730
moderate-risk
Published 2017-09-25
The init script in the Gentoo app-admin/logstash-bin package before 5.5.3 and 5.6.x before 5.6.1 has "chown -R" calls for user-writable directory trees, which allows local users to gain privileges by leveraging access to a $LS_USER account for creation of a hard link.
Do I need to act?
-
0.04% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Products (17)
Logstash
Logstash
Logstash
Logstash
Logstash
Logstash
Logstash
Logstash
Logstash
Logstash
Logstash
Logstash
Logstash
Logstash
Logstash
Logstash
Logstash
Affected Vendors
References (8)
Third Party Advisory
https://bugs.gentoo.org/628558
Third Party Advisory
https://github.com/gentoo/gentoo/pull/5665
Third Party Advisory
https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=18f97c851c209f291b31ae7a902...
Third Party Advisory
https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=bbd6cb398c1740c68e9b1b78340...
Third Party Advisory
https://bugs.gentoo.org/628558
Third Party Advisory
https://github.com/gentoo/gentoo/pull/5665
Third Party Advisory
https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=18f97c851c209f291b31ae7a902...
Third Party Advisory
https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=bbd6cb398c1740c68e9b1b78340...
43
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
0/34 · Minimal
Exposure
19/34 · Moderate