Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2018:3240-1

Опубликовано: 19 окт. 2018
Источник: suse-cvrf

Описание

Security update for nagios

This update for nagios fixes the following issues:

  • CVE-2016-8641 / CVE-2016-10089: fixed possible symlink attacks for files/directories created by root (bsc#1011630 / bsc#1018047)

Список пакетов

SUSE Linux Enterprise Server 11 SP4
nagios-3.0.6-1.25.36.3.1
nagios-www-3.0.6-1.25.36.3.1
SUSE Linux Enterprise Server for SAP Applications 11 SP4
nagios-3.0.6-1.25.36.3.1
nagios-www-3.0.6-1.25.36.3.1
SUSE Linux Enterprise Software Development Kit 11 SP4
nagios-3.0.6-1.25.36.3.1
nagios-devel-3.0.6-1.25.36.3.1
nagios-www-3.0.6-1.25.36.3.1

Описание

Nagios 4.3.2 and earlier allows local users to gain root privileges via a hard link attack on the Nagios init script file, related to CVE-2016-8641.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4:nagios-3.0.6-1.25.36.3.1
SUSE Linux Enterprise Server 11 SP4:nagios-www-3.0.6-1.25.36.3.1
SUSE Linux Enterprise Server for SAP Applications 11 SP4:nagios-3.0.6-1.25.36.3.1
SUSE Linux Enterprise Server for SAP Applications 11 SP4:nagios-www-3.0.6-1.25.36.3.1

Ссылки

Описание

A privilege escalation vulnerability was found in nagios 4.2.x that occurs in daemon-init.in when creating necessary files and insecurely changing the ownership afterwards. It's possible for the local attacker to create symbolic links before the files are to be created and possibly escalating the privileges with the ownership change.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4:nagios-3.0.6-1.25.36.3.1
SUSE Linux Enterprise Server 11 SP4:nagios-www-3.0.6-1.25.36.3.1
SUSE Linux Enterprise Server for SAP Applications 11 SP4:nagios-3.0.6-1.25.36.3.1
SUSE Linux Enterprise Server for SAP Applications 11 SP4:nagios-www-3.0.6-1.25.36.3.1

Ссылки