Summary: | net-analyzer/nagios-plugins: IPXPING_COMMAND uses fixed location in /tmp (CVE-2013-4215) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED INVALID | ||
Severity: | minor | CC: | mjo, sysadmin |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=957482 | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2013-08-09 12:30:15 UTC
CVE-2013-4215 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4215): The IPXPING_COMMAND in contrib/check_ipxping.c in Nagios Plugins 1.4.16 allows local users to gain privileges via a symlink attack on /tmp/ipxping/ipxping. I'm pretty sure this is INVALID for us. We don't even build the check_ipxping plugin; both 1.4.x ebuilds immediately delete the check_ipxping.c file: cd contrib/ dodoc *README* # remove stuff that is way too broken to fix, or for which the USE # flag has been removed. rm -r tarballs aix \ check_compaq_insight.pl *.c *README* \ $(usex !jabber nagios_sendim.pl) \ $(usex !smart check_smart.pl) The 2.x series of nagios-plugins is now stable anyway, and the 1.4.x series is gone. So this is taken-care-of either way. (In reply to Michael Orlitzky from comment #2) > I'm pretty sure this is INVALID for us. We don't even build the > check_ipxping plugin; both 1.4.x ebuilds immediately delete the > check_ipxping.c file: > Thanks, this can indeed be closed INVALID |