CVE-2018-6536
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An issue was discovered in Icinga 2.x through 2.8.1. The daemon creates an icinga2.pid file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for icinga2.pid modification before a root script executes a "kill `cat /pathname/icinga2.pid`" command, as demonstrated by icinga2.init.d.cmake.
Se ha descubierto un problema en Icinga hasta la versión 2.8.1. El demonio crea un archivo icinga2.pid tras eliminar privilegios a una cuenta no root, lo que podría permitir que usuarios locales terminen procesos arbitrarios aprovechando el acceso a esta cuenta no root para modificar el archivo icinga2.pid antes de que un script root ejecute un comando "kill `cat /pathname/icinga2.pid`". Esto se ha demostrado con etc/init.d/icinga2.init.d.cmake.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-02-02 CVE Reserved
- 2018-02-02 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-732: Incorrect Permission Assignment for Critical Resource
CAPEC
References (1)
URL | Tag | Source |
---|---|---|
https://github.com/Icinga/icinga2/issues/5991 | Issue Tracking |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Icinga Search vendor "Icinga" | Icinga Search vendor "Icinga" for product "Icinga" | >= 2.0.0 <= 2.8.1 Search vendor "Icinga" for product "Icinga" and version " >= 2.0.0 <= 2.8.1" | - |
Affected
|