Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-12847

Опубликовано: 28 июл. 2017
Источник: redhat
CVSS3: 4.4
EPSS Низкий

Описание

Nagios Core before 4.3.3 creates a nagios.lock PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for nagios.lock modification before a root script executes a "kill cat /pathname/nagios.lock" command.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux OpenStack Platform 6 (Juno)nagiosWill not fix
Red Hat Enterprise Linux OpenStack Platform 7 (Kilo)nagiosWill not fix
Red Hat Mobile Application Platform 4nagiosOut of support scope
Red Hat Storage 3nagiosWill not fix

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-732
https://bugzilla.redhat.com/show_bug.cgi?id=1482479nagios: Incorrect permissions for PID file

EPSS

Процентиль: 30%
0.00114
Низкий

4.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.3
ubuntu
больше 8 лет назад

Nagios Core before 4.3.3 creates a nagios.lock PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for nagios.lock modification before a root script executes a "kill `cat /pathname/nagios.lock`" command.

CVSS3: 6.3
nvd
больше 8 лет назад

Nagios Core before 4.3.3 creates a nagios.lock PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for nagios.lock modification before a root script executes a "kill `cat /pathname/nagios.lock`" command.

CVSS3: 6.3
debian
больше 8 лет назад

Nagios Core before 4.3.3 creates a nagios.lock PID file after dropping ...

CVSS3: 6.3
github
больше 3 лет назад

Nagios Core before 4.3.3 creates a nagios.lock PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for nagios.lock modification before a root script executes a "kill `cat /pathname/nagios.lock`" command.

EPSS

Процентиль: 30%
0.00114
Низкий

4.4 Medium

CVSS3