7.2
CVSSv2

CVE-2017-14312

Published: 11/09/2017 Updated: 03/10/2019
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Nagios Core up to and including 4.3.4 initially executes /usr/sbin/nagios as root but supports configuration options in which this file is owned by a non-root account (and similarly can have nagios.cfg owned by a non-root account), which allows local users to gain privileges by leveraging access to this non-root account.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

nagios nagios core

Vendor Advisories

Nagios Core through 434 initially executes /usr/sbin/nagios as root but supports configuration options in which this file is owned by a non-root account (and similarly can have nagioscfg owned by a non-root account), which allows local users to gain privileges by leveraging access to this non-root account ...