Vulnerability Name: | CVE-2017-16882 (CCN-135109) | ||||||||||||||||||||||||||||||||||||
Assigned: | 2017-11-18 | ||||||||||||||||||||||||||||||||||||
Published: | 2017-11-18 | ||||||||||||||||||||||||||||||||||||
Updated: | 2020-07-27 | ||||||||||||||||||||||||||||||||||||
Summary: | Icinga Core through 1.14.0 initially executes bin/icinga as root but supports configuration options in which this file is owned by a non-root account (and similarly can have etc/icinga.cfg owned by a non-root account), which allows local users to gain privileges by leveraging access to this non-root account, a related issue to CVE-2017-14312. This also affects bin/icingastats, bin/ido2db, and bin/log2ido. | ||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.9 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
7.4 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
| ||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-732 | ||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-16882 Source: XF Type: UNKNOWN icinga-cve201716882-priv-esc(135109) Source: CCN Type: Icinga Core GIT Repository Root privilege escalation via insecure permissions (CVE-2017-16882) #1601 Source: MISC Type: Third Party Advisory https://github.com/Icinga/icinga-core/issues/1601 Source: GENTOO Type: UNKNOWN GLSA-202007-31 Source: CCN Type: WhiteSource Vulnerability Database CVE-2017-16882 | ||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
BACK |