The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

vulnerability alert CVE-2013-2029

Nagios: file corruption via nagios.upgrade_to_v3.sh

Synthesis of the vulnerability

When the administrator runs the nagios.upgrade_to_v3.sh script, a local attacker can create a symbolic link, in order to corrupt a file with root privileges.
Impacted products: Fedora, Nagios Open Source, RHEL.
Severity: 2/4.
Creation date: 02/05/2013.
Identifiers: 958015, BID-59596, CVE-2013-2029, FEDORA-2013-10950, RHSA-2013:1526-01, VIGILANCE-VUL-12741.

Description of the vulnerability

The nagios.upgrade_to_v3.sh script is installed by some Linux distributions, in order to migrate Nagios to a recent version.

However, this script uses a predictable filename (/tmp/nagioscfg.$$.tmp) to store the configuration.

When the administrator runs the nagios.upgrade_to_v3.sh script, a local attacker can therefore create a symbolic link, in order to corrupt a file with root privileges.
Complete Vigil@nce bulletin.... (free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a computer vulnerability patch. The Vigil@nce vulnerability database contains several thousand vulnerabilities. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system. Each administrator can customize the list of products for which he wants to receive vulnerability alerts.