CVE-2013-2029
nagios.upgrade_to_v3.sh, as distributed by Red Hat and possibly others for Nagios Core 3.4.4, 3.5.1, and earlier, allows local users to overwrite arbitrary files via a symlink attack on a temporary nagioscfg file with a predictable name in /tmp/.
Published
2013-11-23T17:55:03.417
Last Modified
2025-04-11T00:51:21.963
Status
Deferred
Source
[email protected]
Severity
CVSSv2: 6.3 (MEDIUM)
CVSSv2 Vector
AV:L/AC:M/Au:N/C:N/I:C/A:C
- Access Vector: LOCAL
- Access Complexity: MEDIUM
- Authentication: NONE
- Confidentiality Impact: NONE
- Integrity Impact: COMPLETE
- Availability Impact: COMPLETE
Exploitability Score
3.4
Impact Score
9.2
Weaknesses
Affected Vendors & Products
| Type |
Vendor |
Product |
Version/Range |
Vulnerable? |
| Application |
redhat
|
openstack
|
3.0 |
Yes
|
References