First published: Thu Nov 16 2017(Updated: )
PNP4Nagios through 0.6.26 has /usr/bin/npcd and npcd.cfg owned by an unprivileged account but root code execution depends on these files, which allows local users to gain privileges by leveraging access to this unprivileged account.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PNP4Nagios | <=0.6.26 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-16834 is considered to have a high severity due to its potential for local privilege escalation.
To fix CVE-2017-16834, ensure that /usr/bin/npcd and npcd.cfg are owned by the root account and restrict access to unprivileged users.
CVE-2017-16834 affects systems running Pnp4Nagios versions up to and including 0.6.26.
The potential impacts of CVE-2017-16834 include unauthorized local privilege escalation, allowing users to execute arbitrary code with higher privileges.
There is no specific patch mentioned for CVE-2017-16834, but applying best security practices regarding file permissions can mitigate the risk.