Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-14312

Опубликовано: 30 авг. 2017
Источник: redhat
CVSS3: 6.7

Описание

Nagios Core through 4.3.4 initially executes /usr/sbin/nagios as root but supports configuration options in which this file is owned by a non-root account (and similarly can have nagios.cfg owned by a non-root account), which allows local users to gain privileges by leveraging access to this non-root account.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux OpenStack Platform 6 (Juno)nagiosWill not fix
Red Hat Enterprise Linux OpenStack Platform 7 (Kilo)nagiosWill not fix
Red Hat Mobile Application Platform 4nagiosNot affected
Red Hat Storage 3nagiosWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-732
https://bugzilla.redhat.com/show_bug.cgi?id=1490858nagios: Incorrect file permissions leading to possible privilege escalation

6.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 8 лет назад

Nagios Core through 4.3.4 initially executes /usr/sbin/nagios as root but supports configuration options in which this file is owned by a non-root account (and similarly can have nagios.cfg owned by a non-root account), which allows local users to gain privileges by leveraging access to this non-root account.

CVSS3: 7.8
nvd
больше 8 лет назад

Nagios Core through 4.3.4 initially executes /usr/sbin/nagios as root but supports configuration options in which this file is owned by a non-root account (and similarly can have nagios.cfg owned by a non-root account), which allows local users to gain privileges by leveraging access to this non-root account.

CVSS3: 7.8
debian
больше 8 лет назад

Nagios Core through 4.3.4 initially executes /usr/sbin/nagios as root ...

CVSS3: 7.8
github
больше 3 лет назад

Nagios Core through 4.3.4 initially executes /usr/sbin/nagios as root but supports configuration options in which this file is owned by a non-root account (and similarly can have nagios.cfg owned by a non-root account), which allows local users to gain privileges by leveraging access to this non-root account.

6.7 Medium

CVSS3