First published: Mon Sep 11 2017(Updated: )
Nagios Core through 4.3.4 initially executes /usr/sbin/nagios as root but supports configuration options in which this file is owned by a non-root account (and similarly can have nagios.cfg owned by a non-root account), which allows local users to gain privileges by leveraging access to this non-root account.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nagios | <=4.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14312 is considered to have a medium severity due to its potential for privilege escalation.
To fix CVE-2017-14312, ensure that /usr/sbin/nagios and nagios.cfg are owned by the root account and have the appropriate file permissions.
CVE-2017-14312 affects users running Nagios Core versions up to and including 4.3.4.
CVE-2017-14312 is a local privilege escalation vulnerability and cannot be exploited remotely.
Nagios Core versions prior to 4.3.5 are vulnerable to CVE-2017-14312.