Skip to main content

CVE-2017-20147: n/a in n/a

Medium
VulnerabilityCVE-2017-20147cvecve-2017-20147
Published: Tue Sep 20 2022 (09/20/2022, 17:00:51 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

In the ebuild package through smokeping-2.7.3-r1 for SmokePing on Gentoo, the initscript uses a PID file that is writable by the smokeping user. By writing arbitrary PIDs to that file, the smokeping user can cause a denial of service to arbitrary PIDs when the service is stopped.

AI-Powered Analysis

AILast updated: 07/08/2025, 03:13:25 UTC

Technical Analysis

CVE-2017-20147 is a medium-severity vulnerability affecting the SmokePing monitoring tool, specifically the ebuild package smokeping-2.7.3-r1 on Gentoo Linux. The issue arises from the way the initscript manages the PID file used to track the SmokePing service process. This PID file is writable by the unprivileged 'smokeping' user. An attacker with smokeping user privileges can exploit this by writing arbitrary process IDs into the PID file. When the SmokePing service is stopped, the initscript reads the PID file and attempts to terminate the process with the specified PID. Because the PID file contents can be manipulated, the attacker can cause the initscript to send termination signals to arbitrary processes on the system, potentially killing critical system or application processes. This results in a denial of service (DoS) condition. The vulnerability does not affect confidentiality or integrity directly but impacts availability by enabling unauthorized termination of processes. Exploitation requires local access with smokeping user privileges but does not require user interaction. The CVSS v3.1 score is 6.5 (medium), reflecting network attack vector, low attack complexity, privileges required, no user interaction, unchanged scope, and impact limited to availability. The root cause is improper file permission management (CWE-377: Insecure Temporary File). No known public exploits have been reported. The vulnerability is specific to the Gentoo ebuild package for SmokePing version 2.7.3-r1, and no patch links are provided in the data, indicating that mitigation may require manual configuration changes or updates from maintainers.

Potential Impact

For European organizations using Gentoo Linux with the vulnerable SmokePing package, this vulnerability poses a risk of local denial of service. SmokePing is a network latency monitoring tool often used in network operations centers to track network performance. If an attacker gains smokeping user access, they could disrupt monitoring services or cause collateral damage by terminating unrelated critical processes, potentially impacting network monitoring reliability and operational continuity. This could lead to delayed detection of network issues or outages, affecting service quality and incident response. While the vulnerability requires local access, in environments where multiple users have access or where the smokeping user privileges are not tightly controlled, the risk increases. European organizations with strict uptime and monitoring requirements, such as telecom providers, ISPs, and large enterprises with complex network infrastructures, could face operational disruptions. The impact on confidentiality and integrity is minimal, but availability degradation could have cascading effects on network management and incident handling.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately review and restrict file permissions on the SmokePing PID file to ensure it is not writable by the smokeping user or any unprivileged user. The PID file should be owned by root or the service manager with write permissions limited accordingly. 2) Upgrade to a fixed version of SmokePing or the Gentoo ebuild package once available, or apply vendor-provided patches if released. 3) Limit smokeping user privileges strictly to what is necessary, avoiding granting shell access or other capabilities that could facilitate local exploitation. 4) Implement monitoring and alerting for unexpected termination of critical processes to detect potential exploitation attempts. 5) Use system-level protections such as process accounting and auditd to track suspicious activities related to process termination. 6) Consider containerizing or sandboxing the SmokePing service to isolate it from critical system processes, reducing the blast radius of potential exploitation. 7) Regularly review and harden init scripts and service management configurations to prevent writable PID files or other insecure file permission issues.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-09-20T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683864b2182aa0cae27f9cc2

Added to database: 5/29/2025, 1:44:18 PM

Last enriched: 7/8/2025, 3:13:25 AM

Last updated: 8/5/2025, 12:42:50 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats