vulnerability alert CVE-2013-2029
Nagios: file corruption via nagios.upgrade_to_v3.sh
Synthesis of the vulnerability
When the administrator runs the nagios.upgrade_to_v3.sh script, a local attacker can create a symbolic link, in order to corrupt a file with root privileges.Impacted products: Fedora
, Nagios Open Source
958015, BID-59596, CVE-2013-2029, FEDORA-2013-10950, RHSA-2013:1526-01, VIGILANCE-VUL-12741.
Description of the vulnerability
The nagios.upgrade_to_v3.sh script is installed by some Linux distributions, in order to migrate Nagios to a recent version.
However, this script uses a predictable filename (/tmp/nagioscfg.$$.tmp) to store the configuration.
When the administrator runs the nagios.upgrade_to_v3.sh script, a local attacker can therefore create a symbolic link, in order to corrupt a file with root privileges.Complete Vigil@nce bulletin....
Share this bulletin
Computer vulnerabilities tracking service
Vigil@nce provides a computer vulnerability patch
. The Vigil@nce vulnerability database contains several thousand vulnerabilities. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system. Each administrator can customize the list of products for which he wants to receive vulnerability alerts.