First published: Sun Aug 12 2012(Updated: )
PNP4Nagios 0.6 through 0.6.16 uses world-readable permissions for process_perfdata.cfg, which allows local users to obtain the Gearman shared secret by reading the file.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PNP4Nagios | =0.6.0 | |
PNP4Nagios | =0.6.1 | |
PNP4Nagios | =0.6.2 | |
PNP4Nagios | =0.6.3 | |
PNP4Nagios | =0.6.4 | |
PNP4Nagios | =0.6.5 | |
PNP4Nagios | =0.6.6 | |
PNP4Nagios | =0.6.7 | |
PNP4Nagios | =0.6.10 | |
PNP4Nagios | =0.6.11 | |
PNP4Nagios | =0.6.12 | |
PNP4Nagios | =0.6.13 | |
PNP4Nagios | =0.6.14 | |
PNP4Nagios | =0.6.15 | |
PNP4Nagios | =0.6.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3457 has a moderate severity rating due to its potential to expose sensitive configuration data.
To fix CVE-2012-3457, you should change the permissions on process_perfdata.cfg to restrict access to authorized users only.
CVE-2012-3457 affects PNP4Nagios versions 0.6.0 through 0.6.16.
CVE-2012-3457 is a local privilege escalation vulnerability that allows unauthorized local users to read sensitive files.
CVE-2012-3457 can impact your system by allowing local users to access the Gearman shared secret, compromising system confidentiality.