Nagios Core through 4.3.4 initially executes /usr/sbin/nagios as root but supports configuration options in which this file is owned by a non-root account (and similarly can have nagios.cfg owned by a non-root account), which allows local users to gain privileges by leveraging access to this non-root account.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Link | Tags |
---|---|
https://security.gentoo.org/glsa/201812-03 | vendor advisory |
https://github.com/NagiosEnterprises/nagioscore/issues/424 | third party advisory issue tracking |
http://www.securityfocus.com/bid/100881 | vdb entry |