Security News > 2016 > December > Nagios 4.2.4 closes serious root privilege escalation bug (Help Net Security)

Nagios 4.2.4 closes serious root privilege escalation bug (Help Net Security)
2016-12-16 13:30

If you’re using Nagios to monitor your systems, networks and infrastructure, and you have not updated to version 4.2.4, you better hop to it. This latest release fixes a high severity root privilege escalation vulnerability (CVE-2016-9566) discovered by researcher Dawid Golunski, who published a proof-of-concept exploit for it on Thursday. “Nagios Core daemon in versions below 4.2.4 was found to perform unsafe operations when handling the log file. This could be exploited by malicious local … More →


News URL

http://feedproxy.google.com/~r/HelpNetSecurity/~3/97LtAQLPNjo/

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2016-12-15 CVE-2016-9566 Link Following vulnerability in Nagios
base/logging.c in Nagios Core before 4.2.4 allows local users with access to an account in the nagios group to gain root privileges via a symlink attack on the log file.
local
low complexity
nagios CWE-59
7.8

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Nagios 15 0 62 51 33 146