Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-16834

Опубликовано: 15 нояб. 2017
Источник: redhat
CVSS3: 6.7

Описание

PNP4Nagios through 0.6.26 has /usr/bin/npcd and npcd.cfg owned by an unprivileged account but root code execution depends on these files, which allows local users to gain privileges by leveraging access to this unprivileged account.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Storage 3pnp4nagiosNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-732
https://bugzilla.redhat.com/show_bug.cgi?id=1517341pnp4nagios: privilege escalation via insecure permissions

6.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 8 лет назад

PNP4Nagios through 0.6.26 has /usr/bin/npcd and npcd.cfg owned by an unprivileged account but root code execution depends on these files, which allows local users to gain privileges by leveraging access to this unprivileged account.

CVSS3: 7.8
nvd
около 8 лет назад

PNP4Nagios through 0.6.26 has /usr/bin/npcd and npcd.cfg owned by an unprivileged account but root code execution depends on these files, which allows local users to gain privileges by leveraging access to this unprivileged account.

CVSS3: 7.8
debian
около 8 лет назад

PNP4Nagios through 0.6.26 has /usr/bin/npcd and npcd.cfg owned by an u ...

CVSS3: 7.8
github
больше 3 лет назад

PNP4Nagios through 0.6.26 has /usr/bin/npcd and npcd.cfg owned by an unprivileged account but root code execution depends on these files, which allows local users to gain privileges by leveraging access to this unprivileged account.

6.7 Medium

CVSS3