base/logging.c in Nagios Core before 4.2.4 allows local users with access to an account in the nagios group to gain root privileges via a symlink attack on the log file. NOTE: this can be leveraged by remote attackers using CVE-2016-9565.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Nagios | Nagios | * | 4.2.3 (including) |
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6 | RedHat | nagios-0:3.5.1-9.el6 | * |
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7 | RedHat | nagios-0:3.5.1-9.el7 | * |
Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7 | RedHat | nagios-0:3.5.1-9.el7 | * |
Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7 | RedHat | nagios-0:3.5.1-9.el7 | * |
Red Hat Gluster Storage 3.1 for RHEL 6 | RedHat | nagios-0:3.5.1-9.el6 | * |
Red Hat Gluster Storage 3.1 for RHEL 7 | RedHat | nagios-0:3.5.1-9.el7 | * |
Nagios3 | Ubuntu | devel | * |
Nagios3 | Ubuntu | precise | * |
Nagios3 | Ubuntu | trusty | * |
Nagios3 | Ubuntu | xenial | * |
Nagios3 | Ubuntu | yakkety | * |
Nagios3 | Ubuntu | zesty | * |