Executive Summary
Summary | |
---|---|
Title | New Nagios packages fix arbitrary code execution |
Informations | |||
---|---|---|---|
Name | DSA-1072 | First vendor Publication | 2006-05-22 |
Vendor | Debian | Last vendor Modification | 2006-05-22 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A buffer overflow has been discovered in nagios, a host, service and network monitoring and management system, that could be exploited by remote attackers to execute arbitrary code. The old stable distribution (woody) does not contain nagios packages. For the stable distribution (sarge) this problem has been fixed in version 1.3-cvs.20050402-2.sarge.2. For the unstable distribution (sid) this problem has been fixed in version 1.4-1 and 2.3-1. We recommend that you upgrade your nagios package. |
Original Source
Url : http://www.debian.org/security/2006/dsa-1072 |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2008-09-24 | Name : Gentoo Security Advisory GLSA 200605-07 (nagios) File : nvt/glsa_200605_07.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 1072-1 (nagios) File : nvt/deb_1072_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
25543 | Nagios Content-Length HTTP Header Integer Overflow |
25434 | Nagios Negative Content-Length HTTP Header Overflow |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | HTTP request with negative Content-Length attempt RuleID : 2278-community - Revision : 34 - Type : SERVER-WEBAPP |
2014-01-10 | HTTP request with negative Content-Length attempt RuleID : 2278 - Revision : 33 - Type : SERVER-WEBAPP |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2009-09-24 | Name : The remote SuSE 9 host is missing a security-related patch. File : suse9_10984.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_nagios-www-1311.nasl - Type : ACT_GATHER_INFO |
2006-10-14 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1072.nasl - Type : ACT_GATHER_INFO |
2006-05-29 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-287-1.nasl - Type : ACT_GATHER_INFO |
2006-05-13 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200605-07.nasl - Type : ACT_GATHER_INFO |
2006-05-13 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-282-1.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:25:49 |
|