PNP4Nagios through 0.6.26 has /usr/bin/npcd and npcd.cfg owned by an unprivileged account but root code execution depends on these files, which allows local users to gain privileges by leveraging access to this unprivileged account.
References
Link | Resource |
---|---|
https://github.com/lingej/pnp4nagios/issues/140 | Issue Tracking Patch Third Party Advisory |
https://security.gentoo.org/glsa/201806-09 | |
https://github.com/lingej/pnp4nagios/issues/140 | Issue Tracking Patch Third Party Advisory |
https://security.gentoo.org/glsa/201806-09 |
Configurations
History
21 Nov 2024, 03:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/lingej/pnp4nagios/issues/140 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201806-09 - |
Information
Published : 2017-11-16 02:29
Updated : 2024-11-21 03:17
NVD link : CVE-2017-16834
Mitre link : CVE-2017-16834
CVE.ORG link : CVE-2017-16834
JSON object : View
Products Affected
pnp4nagios
- pnp4nagios
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource