CVE-2013-2029 | Date: (C)2013-11-28 (M)2023-12-22 |
nagios.upgrade_to_v3.sh, as distributed by Red Hat and possibly others for Nagios Core 3.4.4, 3.5.1, and earlier, allows local users to overwrite arbitrary files via a symlink attack on a temporary nagioscfg file with a predictable name in /tmp/.
CVSS Score and Metrics +CVSS Score and Metrics -CVSS V2 Severity: |
CVSS Score : 6.3 |
Exploit Score: 3.4 |
Impact Score: 9.2 |
|
CVSS V2 Metrics: |
Access Vector: LOCAL |
Access Complexity: MEDIUM |
Authentication: NONE |
Confidentiality: NONE |
Integrity: COMPLETE |
Availability: COMPLETE |
| |