Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-16834

Опубликовано: 16 нояб. 2017
Источник: debian
EPSS Низкий

Описание

PNP4Nagios through 0.6.26 has /usr/bin/npcd and npcd.cfg owned by an unprivileged account but root code execution depends on these files, which allows local users to gain privileges by leveraging access to this unprivileged account.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pnp4nagiosnot-affectedpackage

Примечания

  • https://github.com/lingej/pnp4nagios/issues/140

EPSS

Процентиль: 11%
0.00038
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 8 лет назад

PNP4Nagios through 0.6.26 has /usr/bin/npcd and npcd.cfg owned by an unprivileged account but root code execution depends on these files, which allows local users to gain privileges by leveraging access to this unprivileged account.

CVSS3: 6.7
redhat
около 8 лет назад

PNP4Nagios through 0.6.26 has /usr/bin/npcd and npcd.cfg owned by an unprivileged account but root code execution depends on these files, which allows local users to gain privileges by leveraging access to this unprivileged account.

CVSS3: 7.8
nvd
около 8 лет назад

PNP4Nagios through 0.6.26 has /usr/bin/npcd and npcd.cfg owned by an unprivileged account but root code execution depends on these files, which allows local users to gain privileges by leveraging access to this unprivileged account.

CVSS3: 7.8
github
больше 3 лет назад

PNP4Nagios through 0.6.26 has /usr/bin/npcd and npcd.cfg owned by an unprivileged account but root code execution depends on these files, which allows local users to gain privileges by leveraging access to this unprivileged account.

EPSS

Процентиль: 11%
0.00038
Низкий