Executive Summary

Summary
TitleIcinga: Privilege escalation
Informations
NameGLSA-201612-51First vendor Publication2016-12-31
VendorGentooLast vendor Modification2016-12-31
Severity (Vendor) N/ARevisionN/A

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score7.2Attack RangeLocal
Cvss Impact Score10Attack ComplexityLow
Cvss Expoit Score3.9AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Synopsis

A vulnerability in Icinga could lead to privilege escalation.

Background

Icinga is an open source computer system and network monitoring application. It was originally created as a fork of the Nagios system monitoring application in 2009.

Description

Icinga daemon was found to perform unsafe operations when handling the log file.

Impact

A local attacker, who either is already Icinga's system user or belongs to Icinga's group, could potentially escalate privileges.

Workaround

There is no known workaround at this time.

Resolution

All Icinga users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-analyzer/icinga-1.13.4"

References

[ 1 ] CVE-2016-9566
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9566

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

https://security.gentoo.org/glsa/201612-51

Original Source

Url : http://security.gentoo.org/glsa/glsa-201612-51.xml

CWE : Common Weakness Enumeration

%idName
50 %CWE-264Permissions, Privileges, and Access Controls
50 %CWE-59Improper Link Resolution Before File Access ('Link Following')

CPE : Common Platform Enumeration

TypeDescriptionCount
Application85

Snort® IPS/IDS

DateDescription
2017-04-12Nagios Core privilege escalation attempt
RuleID : 41824 - Revision : 2 - Type : SERVER-OTHER
2017-04-12Nagios Core privilege escalation attempt
RuleID : 41823 - Revision : 3 - Type : SERVER-OTHER

Nessus® Vulnerability Scanner

DateDescription
2018-12-27Name : The remote Debian host is missing a security update.
File : debian_DLA-1615.nasl - Type : ACT_GATHER_INFO
2018-01-15Name : The remote Fedora host is missing a security update.
File : fedora_2017-d270e932a3.nasl - Type : ACT_GATHER_INFO
2017-10-18Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201710-20.nasl - Type : ACT_GATHER_INFO
2017-10-04Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2017-899.nasl - Type : ACT_GATHER_INFO
2017-06-08Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-3253-2.nasl - Type : ACT_GATHER_INFO
2017-04-04Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-3253-1.nasl - Type : ACT_GATHER_INFO
2017-02-21Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201702-26.nasl - Type : ACT_GATHER_INFO
2017-02-08Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2017-0258.nasl - Type : ACT_GATHER_INFO
2017-02-08Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2017-0259.nasl - Type : ACT_GATHER_INFO
2017-01-17Name : The remote openSUSE host is missing a security update.
File : openSUSE-2017-100.nasl - Type : ACT_GATHER_INFO
2017-01-03Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201612-51.nasl - Type : ACT_GATHER_INFO
2016-12-20Name : The remote Debian host is missing a security update.
File : debian_DLA-751.nasl - Type : ACT_GATHER_INFO
2016-12-20Name : The remote Debian host is missing a security update.
File : debian_DLA-751.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
DateInformations
2017-01-04 13:23:10
  • Multiple Updates
2016-12-31 09:23:41
  • First insertion