Lucene search

K
cveMitreCVE-2013-7106
HistoryJan 15, 2014 - 4:08 p.m.

CVE-2013-7106

2014-01-1516:08:03
CWE-119
mitre
web.nvd.nist.gov
36
cve-2013-7106
stack-based buffer overflow
icinga
denial of service
remote code execution
authentication bypass
nvd

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

AI Score

7.7

Confidence

Low

EPSS

0.018

Percentile

88.0%

Multiple stack-based buffer overflows in Icinga before 1.8.5, 1.9 before 1.9.4, and 1.10 before 1.10.2 allow remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a long string to the (1) display_nav_table, (2) page_limit_selector, (3) print_export_link, or (4) page_num_selector function in cgi/cgiutils.c; (5) status_page_num_selector function in cgi/status.c; or (6) display_command_expansion function in cgi/config.c. NOTE: this can be exploited without authentication by leveraging CVE-2013-7107.

Affected configurations

Nvd
Node
icingaicingaRange1.8.4
OR
icingaicingaMatch0.8.0
OR
icingaicingaMatch0.8.1
OR
icingaicingaMatch0.8.2
OR
icingaicingaMatch0.8.3
OR
icingaicingaMatch0.8.4
OR
icingaicingaMatch1.0
OR
icingaicingaMatch1.0rc1
OR
icingaicingaMatch1.0.1
OR
icingaicingaMatch1.0.2
OR
icingaicingaMatch1.0.3
OR
icingaicingaMatch1.2.0
OR
icingaicingaMatch1.2.1
OR
icingaicingaMatch1.3.0
OR
icingaicingaMatch1.3.1
OR
icingaicingaMatch1.4.0
OR
icingaicingaMatch1.4.1
OR
icingaicingaMatch1.6.0
OR
icingaicingaMatch1.6.1
OR
icingaicingaMatch1.6.2
OR
icingaicingaMatch1.7.0
OR
icingaicingaMatch1.7.1
OR
icingaicingaMatch1.7.2
OR
icingaicingaMatch1.7.3
OR
icingaicingaMatch1.7.4
OR
icingaicingaMatch1.8.0
OR
icingaicingaMatch1.8.1
OR
icingaicingaMatch1.8.2
OR
icingaicingaMatch1.8.3
OR
icingaicingaMatch1.9.0
OR
icingaicingaMatch1.9.1
OR
icingaicingaMatch1.9.2
OR
icingaicingaMatch1.9.3
OR
icingaicingaMatch1.10.0
OR
icingaicingaMatch1.10.1
VendorProductVersionCPE
icingaicinga*cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*
icingaicinga0.8.0cpe:2.3:a:icinga:icinga:0.8.0:*:*:*:*:*:*:*
icingaicinga0.8.1cpe:2.3:a:icinga:icinga:0.8.1:*:*:*:*:*:*:*
icingaicinga0.8.2cpe:2.3:a:icinga:icinga:0.8.2:*:*:*:*:*:*:*
icingaicinga0.8.3cpe:2.3:a:icinga:icinga:0.8.3:*:*:*:*:*:*:*
icingaicinga0.8.4cpe:2.3:a:icinga:icinga:0.8.4:*:*:*:*:*:*:*
icingaicinga1.0cpe:2.3:a:icinga:icinga:1.0:*:*:*:*:*:*:*
icingaicinga1.0cpe:2.3:a:icinga:icinga:1.0:rc1:*:*:*:*:*:*
icingaicinga1.0.1cpe:2.3:a:icinga:icinga:1.0.1:*:*:*:*:*:*:*
icingaicinga1.0.2cpe:2.3:a:icinga:icinga:1.0.2:*:*:*:*:*:*:*
Rows per page:
1-10 of 351

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

AI Score

7.7

Confidence

Low

EPSS

0.018

Percentile

88.0%