PNP4Nagios through 0.6.26 has /usr/bin/npcd and npcd.cfg owned by an unprivileged account but root code execution depends on these files, which allows local users to gain privileges by leveraging access to this unprivileged account. References: https://github.com/lingej/pnp4nagios/issues/140 http://www.openwall.com/lists/oss-security/2017/11/16/1
Created pnp4nagios tracking bugs for this issue: Affects: epel-all [bug 1517344]
Analysis: spec file used to build this package for Red Hat Gluster Storage 3 contains following line: sed -i -e 's/^INSTALL_OPTS="-o $nagios_user -g $nagios_grp"/INSTALL_OPTS=""/' \ which should remove 'nagios' as default user and group on further check it was observed 1. /etc/pnp4nagios is owned by root 2. /usr/sbin/npcd is owned by root 3. /etc/pnp4nagios/nagios.cfg is owned by root default 'nagios' user cannot edit /etc/pnp4nagios/nagios.cfg as its owned by root.