Nagios Core before 4.3.3 creates a nagios.lock PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for nagios.lock modification before a root script executes a kill cat /pathname/nagios.lock
command.
The product does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected state when it is accessed or used.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Nagios | Nagios | * | 4.3.2 (including) |
Nagios3 | Ubuntu | artful | * |
Nagios3 | Ubuntu | bionic | * |
Nagios3 | Ubuntu | esm-apps/bionic | * |
Nagios3 | Ubuntu | esm-infra/xenial | * |
Nagios3 | Ubuntu | trusty | * |
Nagios3 | Ubuntu | upstream | * |
Nagios3 | Ubuntu | xenial | * |
Nagios3 | Ubuntu | zesty | * |