CVE-2016-9566

base/logging.c in Nagios Core before 4.2.4 allows local users with access to an account in the nagios group to gain root privileges via a symlink attack on the log file. NOTE: this can be leveraged by remote attackers using CVE-2016-9565.
References
Link Resource
http://rhn.redhat.com/errata/RHSA-2017-0211.html
http://rhn.redhat.com/errata/RHSA-2017-0212.html
http://rhn.redhat.com/errata/RHSA-2017-0213.html
http://rhn.redhat.com/errata/RHSA-2017-0214.html
http://rhn.redhat.com/errata/RHSA-2017-0258.html
http://rhn.redhat.com/errata/RHSA-2017-0259.html
http://seclists.org/fulldisclosure/2016/Dec/58 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/94919 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1037487
https://bugzilla.redhat.com/show_bug.cgi?id=1402869 Issue Tracking
https://github.com/NagiosEnterprises/nagioscore/commit/c29557dec91eba2306f5fb11b8da4474ba63f8c4 Issue Tracking Patch
https://legalhackers.com/advisories/Nagios-Exploit-Root-PrivEsc-CVE-2016-9566.html Exploit Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html
https://security.gentoo.org/glsa/201612-51
https://security.gentoo.org/glsa/201702-26
https://security.gentoo.org/glsa/201710-20
https://www.exploit-db.com/exploits/40921/
https://www.nagios.org/projects/nagios-core/history/4x/ Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2017-0211.html
http://rhn.redhat.com/errata/RHSA-2017-0212.html
http://rhn.redhat.com/errata/RHSA-2017-0213.html
http://rhn.redhat.com/errata/RHSA-2017-0214.html
http://rhn.redhat.com/errata/RHSA-2017-0258.html
http://rhn.redhat.com/errata/RHSA-2017-0259.html
http://seclists.org/fulldisclosure/2016/Dec/58 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/94919 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1037487
https://bugzilla.redhat.com/show_bug.cgi?id=1402869 Issue Tracking
https://github.com/NagiosEnterprises/nagioscore/commit/c29557dec91eba2306f5fb11b8da4474ba63f8c4 Issue Tracking Patch
https://legalhackers.com/advisories/Nagios-Exploit-Root-PrivEsc-CVE-2016-9566.html Exploit Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html
https://security.gentoo.org/glsa/201612-51
https://security.gentoo.org/glsa/201702-26
https://security.gentoo.org/glsa/201710-20
https://www.exploit-db.com/exploits/40921/
https://www.nagios.org/projects/nagios-core/history/4x/ Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:01

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2017-0211.html - () http://rhn.redhat.com/errata/RHSA-2017-0211.html -
References () http://rhn.redhat.com/errata/RHSA-2017-0212.html - () http://rhn.redhat.com/errata/RHSA-2017-0212.html -
References () http://rhn.redhat.com/errata/RHSA-2017-0213.html - () http://rhn.redhat.com/errata/RHSA-2017-0213.html -
References () http://rhn.redhat.com/errata/RHSA-2017-0214.html - () http://rhn.redhat.com/errata/RHSA-2017-0214.html -
References () http://rhn.redhat.com/errata/RHSA-2017-0258.html - () http://rhn.redhat.com/errata/RHSA-2017-0258.html -
References () http://rhn.redhat.com/errata/RHSA-2017-0259.html - () http://rhn.redhat.com/errata/RHSA-2017-0259.html -
References () http://seclists.org/fulldisclosure/2016/Dec/58 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2016/Dec/58 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/94919 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/94919 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1037487 - () http://www.securitytracker.com/id/1037487 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=1402869 - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=1402869 - Issue Tracking
References () https://github.com/NagiosEnterprises/nagioscore/commit/c29557dec91eba2306f5fb11b8da4474ba63f8c4 - Issue Tracking, Patch () https://github.com/NagiosEnterprises/nagioscore/commit/c29557dec91eba2306f5fb11b8da4474ba63f8c4 - Issue Tracking, Patch
References () https://legalhackers.com/advisories/Nagios-Exploit-Root-PrivEsc-CVE-2016-9566.html - Exploit, Third Party Advisory () https://legalhackers.com/advisories/Nagios-Exploit-Root-PrivEsc-CVE-2016-9566.html - Exploit, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html - () https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html -
References () https://security.gentoo.org/glsa/201612-51 - () https://security.gentoo.org/glsa/201612-51 -
References () https://security.gentoo.org/glsa/201702-26 - () https://security.gentoo.org/glsa/201702-26 -
References () https://security.gentoo.org/glsa/201710-20 - () https://security.gentoo.org/glsa/201710-20 -
References () https://www.exploit-db.com/exploits/40921/ - () https://www.exploit-db.com/exploits/40921/ -
References () https://www.nagios.org/projects/nagios-core/history/4x/ - Vendor Advisory () https://www.nagios.org/projects/nagios-core/history/4x/ - Vendor Advisory

Information

Published : 2016-12-15 22:59

Updated : 2024-11-21 03:01


NVD link : CVE-2016-9566

Mitre link : CVE-2016-9566

CVE.ORG link : CVE-2016-9566


JSON object : View

Products Affected

nagios

  • nagios
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')

CWE-264

Permissions, Privileges, and Access Controls