### [CVE-2017-14159](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14159) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description slapd in OpenLDAP 2.4.45 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command, as demonstrated by openldap-initscript. ### POC #### Reference - https://www.oracle.com/security-alerts/cpuapr2022.html #### Github - https://github.com/andir/nixos-issue-db-example - https://github.com/jparrill/preview-grafeas - https://github.com/testing-felickz/docker-scout-demo