Nagios Core before 4.3.3 creates a nagios.lock PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for nagios.lock modification before a root script executes a "kill cat /pathname/nagios.lock
" command.
{ "binaries": [ { "binary_version": "3.5.1.dfsg-2.1ubuntu1.3", "binary_name": "nagios3" }, { "binary_version": "3.5.1.dfsg-2.1ubuntu1.3", "binary_name": "nagios3-cgi" }, { "binary_version": "3.5.1.dfsg-2.1ubuntu1.3", "binary_name": "nagios3-common" }, { "binary_version": "3.5.1.dfsg-2.1ubuntu1.3", "binary_name": "nagios3-core" } ] }
{ "binaries": [ { "binary_version": "3.5.1.dfsg-2.1ubuntu8", "binary_name": "nagios3" }, { "binary_version": "3.5.1.dfsg-2.1ubuntu8", "binary_name": "nagios3-cgi" }, { "binary_version": "3.5.1.dfsg-2.1ubuntu8", "binary_name": "nagios3-common" }, { "binary_version": "3.5.1.dfsg-2.1ubuntu8", "binary_name": "nagios3-core" } ] }