CVE-2013-2029

Impact:
Moderate
Public Date:
2013-04-30
CWE:
CWE-377
Bugzilla:
958015: CVE-2013-2029 Nagios core: Insecure temporary file usage in nagios.upgrade_to_v3.sh

The MITRE CVE dictionary describes this issue as:

nagios.upgrade_to_v3.sh, as distributed by Red Hat and possibly others for Nagios Core 3.4.4, 3.5.1, and earlier, allows local users to overwrite arbitrary files via a symlink attack on a temporary nagioscfg file with a predictable name in /tmp/.

Find out more about CVE-2013-2029 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

The Red Hat Security Response Team has rated this issue as having moderate security impact. This issue is not currently planned to be addressed in OpenStack 2.1 (Folsom). For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

CVSS v2 metrics

Base Score 4.6
Base Metrics AV:L/AC:L/Au:N/C:P/I:P/A:P
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux OpenStack Platform 3.0 (nagios) RHSA-2013:1526 2013-11-18

Affected Packages State

Platform Package State
Red Hat OpenStack Platform 2.1 nagios Will not fix
Red Hat Enterprise Linux OpenStack Platform 4.0 nagios Will not fix

Acknowledgements

This issue was discovered by Grant Murphy of the Red Hat Product Security Team.

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.