UBUNTU-CVE-2017-12847

Source
https://ubuntu.com/security/CVE-2017-12847
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-12847.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2017-12847
Related
Published
2017-08-23T21:29:00Z
Modified
2024-10-15T14:06:01Z
Severity
  • 6.3 (Medium) CVSS_V3 - CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H CVSS Calculator
Summary
[none]
Details

Nagios Core before 4.3.3 creates a nagios.lock PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for nagios.lock modification before a root script executes a "kill cat /pathname/nagios.lock" command.

References

Affected packages

Ubuntu:Pro:16.04:LTS / nagios3

Package

Name
nagios3
Purl
pkg:deb/ubuntu/nagios3?arch=src?distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.5.1-1ubuntu4
3.5.1.dfsg-2ubuntu1
3.5.1.dfsg-2ubuntu2
3.5.1.dfsg-2.1ubuntu1
3.5.1.dfsg-2.1ubuntu1.1
3.5.1.dfsg-2.1ubuntu1.2
3.5.1.dfsg-2.1ubuntu1.3

Ecosystem specific

{
    "ubuntu_priority": "low"
}

Ubuntu:Pro:18.04:LTS / nagios3

Package

Name
nagios3
Purl
pkg:deb/ubuntu/nagios3?arch=src?distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.5.1.dfsg-2.1ubuntu8

Ecosystem specific

{
    "ubuntu_priority": "low"
}