Nagios Core before 4.3.3 creates a nagios.lock PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for nagios.lock modification before a root script executes a "kill cat /pathname/nagios.lock" command.
{
"binaries": [
{
"binary_version": "3.5.1.dfsg-2.1ubuntu1.3",
"binary_name": "nagios3"
},
{
"binary_version": "3.5.1.dfsg-2.1ubuntu1.3",
"binary_name": "nagios3-cgi"
},
{
"binary_version": "3.5.1.dfsg-2.1ubuntu1.3",
"binary_name": "nagios3-common"
},
{
"binary_version": "3.5.1.dfsg-2.1ubuntu1.3",
"binary_name": "nagios3-core"
}
]
}
{
"binaries": [
{
"binary_version": "3.5.1.dfsg-2.1ubuntu8",
"binary_name": "nagios3"
},
{
"binary_version": "3.5.1.dfsg-2.1ubuntu8",
"binary_name": "nagios3-cgi"
},
{
"binary_version": "3.5.1.dfsg-2.1ubuntu8",
"binary_name": "nagios3-common"
},
{
"binary_version": "3.5.1.dfsg-2.1ubuntu8",
"binary_name": "nagios3-core"
}
]
}