Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-14312

Опубликовано: 11 сент. 2017
Источник: nvd
CVSS3: 7.8
CVSS2: 7.2
EPSS Низкий

Описание

Nagios Core through 4.3.4 initially executes /usr/sbin/nagios as root but supports configuration options in which this file is owned by a non-root account (and similarly can have nagios.cfg owned by a non-root account), which allows local users to gain privileges by leveraging access to this non-root account.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:nagios:nagios_core:*:*:*:*:*:*:*:*
Версия до 4.3.4 (включая)

EPSS

Процентиль: 27%
0.00094
Низкий

7.8 High

CVSS3

7.2 High

CVSS2

Дефекты

CWE-269

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 8 лет назад

Nagios Core through 4.3.4 initially executes /usr/sbin/nagios as root but supports configuration options in which this file is owned by a non-root account (and similarly can have nagios.cfg owned by a non-root account), which allows local users to gain privileges by leveraging access to this non-root account.

CVSS3: 6.7
redhat
больше 8 лет назад

Nagios Core through 4.3.4 initially executes /usr/sbin/nagios as root but supports configuration options in which this file is owned by a non-root account (and similarly can have nagios.cfg owned by a non-root account), which allows local users to gain privileges by leveraging access to this non-root account.

CVSS3: 7.8
debian
больше 8 лет назад

Nagios Core through 4.3.4 initially executes /usr/sbin/nagios as root ...

CVSS3: 7.8
github
больше 3 лет назад

Nagios Core through 4.3.4 initially executes /usr/sbin/nagios as root but supports configuration options in which this file is owned by a non-root account (and similarly can have nagios.cfg owned by a non-root account), which allows local users to gain privileges by leveraging access to this non-root account.

EPSS

Процентиль: 27%
0.00094
Низкий

7.8 High

CVSS3

7.2 High

CVSS2

Дефекты

CWE-269