{"id":"CVE-2016-9566","details":"base/logging.c in Nagios Core before 4.2.4 allows local users with access to an account in the nagios group to gain root privileges via a symlink attack on the log file.  NOTE: this can be leveraged by remote attackers using CVE-2016-9565.","modified":"2026-04-16T06:20:16.671629624Z","published":"2016-12-15T22:59:00.537Z","related":["SUSE-SU-2022:3576-1","SUSE-SU-2024:1629-1","openSUSE-SU-2024:11073-1"],"references":[{"type":"WEB","url":"http://www.securitytracker.com/id/1037487"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html"},{"type":"WEB","url":"https://www.exploit-db.com/exploits/40921/"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201702-26"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0214.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0258.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0259.html"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2016/Dec/58"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/94919"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0211.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0212.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0213.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201612-51"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201710-20"},{"type":"ADVISORY","url":"https://www.nagios.org/projects/nagios-core/history/4x/"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1402869"},{"type":"FIX","url":"https://github.com/NagiosEnterprises/nagioscore/commit/c29557dec91eba2306f5fb11b8da4474ba63f8c4"},{"type":"EVIDENCE","url":"https://legalhackers.com/advisories/Nagios-Exploit-Root-PrivEsc-CVE-2016-9566.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/nagiosenterprises/nagioscore","events":[{"introduced":"0"},{"last_affected":"290af75004de0d31a77a66d16b5688ab6a8a6664"},{"fixed":"c29557dec91eba2306f5fb11b8da4474ba63f8c4"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"4.2.3"}]}}],"versions":["4.2.1","nagios-1.0a6","nagios-1.0a7","nagios-1.0b1","nagios-1.0b2","nagios-1.0b3","nagios-1.0b4","nagios-1.0b5","nagios-1.0b6","nagios-2.0","nagios-2.0.b5","nagios-2.0b1","nagios-2.0b2","nagios-2.0b3","nagios-2.0b4","nagios-2.0b6","nagios-2.0rc1","nagios-3.0","nagios-3.0.1","nagios-3.0.2","nagios-3.0.3","nagios-3.0.4","nagios-3.0.5","nagios-3.0.6","nagios-3.0a1","nagios-3.0a2","nagios-3.0a3","nagios-3.0a4","nagios-3.0a5","nagios-3.0b1","nagios-3.0b2","nagios-3.0b3","nagios-3.0b4","nagios-3.0b5","nagios-3.0b6","nagios-3.0b7","nagios-3.0rc1","nagios-3.0rc2","nagios-3.0rc3","nagios-3.1.0","nagios-3.1.1","nagios-3.1.2","nagios-3.2.0","nagios-3.2.1","nagios-3.2.2","nagios-3.2.3","nagios-3.3.1","nagios-3.4.0","nagios-3.4.1","nagios-4.0.0","nagios-4.0.0-beta1","nagios-4.0.0-beta2","nagios-4.0.0-beta3","nagios-4.0.0-beta4","nagios-4.0.4","nagios-4.0.5","nagios-4.0.6","nagios-4.1.0","nagios-4.1.0rc2","nagios-4.1.1","nagios-4.2.1","nagios-4.2.2","nagios-4.2.3","release-4.2.3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-9566.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}