First published: Sun Apr 28 2013(Updated: )
Found during an audit of openstack and all its dependencies. Error: nagios-plugins-1.4.16-6.el6ost/nagios-plugins-1.4.16/contrib/check_ipxping.c #define IPXPING_COMMAND "/tmp/ipxping/ipxping" The IPXPING_COMMAND is used to build command line that is executed later on using execv. As this is a predictable location in a public area a local attacker may place their own file in that location or symlink to another command. AFAICT little or no checks are made about the file permissions or ownership.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nagios Plugins | =1.4.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4215 has a medium severity rating due to its potential for local execution vulnerabilities.
To fix CVE-2013-4215, upgrade to a version of Nagios Plugins that does not use the vulnerable IPXPING_COMMAND.
CVE-2013-4215 affects Nagios Plugins version 1.4.16.
Yes, CVE-2013-4215 can potentially allow privilege escalation through the execution of arbitrary commands.
A temporary workaround for CVE-2013-4215 is to restrict access to the /tmp/ipxping directory and its contents.