Lucene search

K
gentooGentoo FoundationGLSA-201806-09
HistoryJun 24, 2018 - 12:00 a.m.

PNP4Nagios: Root privilege escalation

2018-06-2400:00:00
Gentoo Foundation
security.gentoo.org
519

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

5.1%

Background

PNP4Nagios is an addon for the Nagios Network Monitoring System.

Description

It was found that PHP4Nagios creates files owned by an unprivileged user that are used by root.

Impact

A local attacker could escalate privileges to root.

Workaround

There is no known workaround at this time.

Resolution

All PNP4Nagios users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose
 ">=net-analyzer/pnp4nagios-0.6.26-r9"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-analyzer/pnp4nagios< 0.6.26-r9UNKNOWN

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

5.1%