Nagios Core before 4.3.3 creates a nagios.lock PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for nagios.lock modification before a root script executes a "kill cat /pathname/nagios.lock" command.
{
"binaries": [
{
"binary_name": "nagios3",
"binary_version": "3.5.1.dfsg-2.1ubuntu1.3"
},
{
"binary_name": "nagios3-cgi",
"binary_version": "3.5.1.dfsg-2.1ubuntu1.3"
},
{
"binary_name": "nagios3-common",
"binary_version": "3.5.1.dfsg-2.1ubuntu1.3"
},
{
"binary_name": "nagios3-core",
"binary_version": "3.5.1.dfsg-2.1ubuntu1.3"
}
]
}
{
"binaries": [
{
"binary_name": "nagios3",
"binary_version": "3.5.1.dfsg-2.1ubuntu8"
},
{
"binary_name": "nagios3-cgi",
"binary_version": "3.5.1.dfsg-2.1ubuntu8"
},
{
"binary_name": "nagios3-common",
"binary_version": "3.5.1.dfsg-2.1ubuntu8"
},
{
"binary_name": "nagios3-core",
"binary_version": "3.5.1.dfsg-2.1ubuntu8"
}
]
}