Branch: refs/heads/2.2.0
Home:
https://github.com/Checkmk/checkmk
Commit: 799b798815639a45767869f875b7efa460186894
https://github.com/Checkmk/checkmk/commit/799b798815639a45767869f875b7efa46…
Author: Sofia Colakovic <sofia.colakovic(a)checkmk.com>
Date: 2024-02-28 (Wed, 28 Feb 2024)
Changed paths:
A .werks/16173
M agents/plugins/symantec_av
A tests/unit-shell/agents/plugins/test_symantec_av.sh
Log Message:
-----------
16173 SEC symantec_av: Don't run sav command if it isn't owned by root
Symantec Anti Virus plugin uses /opt/Symantec/symantec_antivirus/sav command
to monitor a Symantec Anti Virus installation.
To prevent privilege escalation, the plugin (which is run by root user) must
not run executables which can be changed by less privileged users.
In the default installation, sav command is owned by root and root is the only
user with write permissions, which prevents privilege escalation attacks.
With this Werk, the plugin checks if sav command is owned by root and root
is the only user with write permissions before running the command. If that's not
the case the command won't be run. This prevents privilege escalation attacks if
the permissions of the sav command have been changed.
We rate this with a CVSS of 0 (None) (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N).
This CVSS is primarily meant to please automatic scanners.
CMK-15318
Change-Id: I677d94136bd21cd54461f6e125764754208d99af
To unsubscribe from these emails, change your notification settings at
https://github.com/Checkmk/checkmk/settings/notifications