7.8

CVE-2017-14730

The init script in the Gentoo app-admin/logstash-bin package before 5.5.3 and 5.6.x before 5.6.1 has "chown -R" calls for user-writable directory trees, which allows local users to gain privileges by leveraging access to a $LS_USER account for creation of a hard link.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ElasticsearchLogstash Version5.0.0
   GentooLinux Version-
ElasticsearchLogstash Version5.0.1
   GentooLinux Version-
ElasticsearchLogstash Version5.0.2
   GentooLinux Version-
ElasticsearchLogstash Version5.1.1
   GentooLinux Version-
ElasticsearchLogstash Version5.1.2
   GentooLinux Version-
ElasticsearchLogstash Version5.2.0
   GentooLinux Version-
ElasticsearchLogstash Version5.2.1
   GentooLinux Version-
ElasticsearchLogstash Version5.3.0
   GentooLinux Version-
ElasticsearchLogstash Version5.3.1
   GentooLinux Version-
ElasticsearchLogstash Version5.3.2
   GentooLinux Version-
ElasticsearchLogstash Version5.4.1
   GentooLinux Version-
ElasticsearchLogstash Version5.4.2
   GentooLinux Version-
ElasticsearchLogstash Version5.4.3
   GentooLinux Version-
ElasticsearchLogstash Version5.5.0
   GentooLinux Version-
ElasticsearchLogstash Version5.5.1
   GentooLinux Version-
ElasticsearchLogstash Version5.5.2
   GentooLinux Version-
ElasticsearchLogstash Version5.6.0
   GentooLinux Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.104
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.2 3.9 10
AV:L/AC:L/Au:N/C:C/I:C/A:C
CWE-732 Incorrect Permission Assignment for Critical Resource

The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.