Executive Summary

Summary
TitleNagios: Privilege escalation
Informations
NameGLSA-201812-03First vendor Publication2018-12-02
VendorGentooLast vendor Modification2018-12-02
Severity (Vendor) N/ARevisionN/A

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score7.2Attack RangeLocal
Cvss Impact Score10Attack ComplexityLow
Cvss Expoit Score3.9AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Synopsis

A vulnerability in Nagios allows local users to escalate privileges.

Background

Nagios is an open source host, service and network monitoring program.

Description

A vulnerability in Nagios was discovered due to the improper handling of configuration files which can be owned by a non-root user.

Impact

A local attacker can escalate privileges to root by leveraging access to a non-root owned configuration file.

Workaround

There is no known workaround at this time.

Resolution

All Nagios users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-analyzer/nagios-core-4.3.4"

References

[ 1 ] CVE-2017-14312 : https://nvd.nist.gov/vuln/detail/CVE-2017-14312

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

https://security.gentoo.org/glsa/201812-03

Original Source

Url : http://security.gentoo.org/glsa/glsa-201812-03.xml

CWE : Common Weakness Enumeration

%idName
100 %CWE-264Permissions, Privileges, and Access Controls

CPE : Common Platform Enumeration

TypeDescriptionCount
Application1

Nessus® Vulnerability Scanner

DateDescription
2018-12-03Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201812-03.nasl - Type : ACT_GATHER_INFO
2018-01-15Name : The remote Fedora host is missing a security update.
File : fedora_2017-d270e932a3.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
DateInformations
2018-12-02 17:18:15
  • First insertion