First published: Fri Feb 02 2018(Updated: )
An issue was discovered in Icinga 2.x through 2.8.1. The daemon creates an icinga2.pid file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for icinga2.pid modification before a root script executes a "kill `cat /pathname/icinga2.pid`" command, as demonstrated by icinga2.init.d.cmake.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Icinga Icinga | >=2.0.0<=2.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-6536 is a vulnerability discovered in Icinga 2.x through 2.8.1, where the daemon creates an icinga2.pid file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for icinga2.pid modification before a root script execution.
The severity of CVE-2018-6536 is medium with a CVSS score of 5.5.
CVE-2018-6536 affects Icinga 2.x versions through 2.8.1.
The CWE ID for CVE-2018-6536 is 732.
Yes, you can find more information about CVE-2018-6536 at the following link: [https://github.com/Icinga/icinga2/issues/5991](https://github.com/Icinga/icinga2/issues/5991).