High severity7.8NVD Advisory· Published Sep 20, 2017· Updated May 13, 2026
CVE-2017-14609
CVE-2017-14609
Description
The server daemons in Kannel 1.5.0 and earlier create a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill cat /pathname" command, as demonstrated by bearerbox.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- redmine.kannel.org/issues/771nvdExploitVendor Advisory
News mentions
0No linked articles in our index yet.