CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:N/A:P
AI Score
Confidence
High
EPSS
Percentile
99.2%
Multiple off-by-one errors in Nagios Core 3.5.1, 4.0.2, and earlier, and Icinga before 1.8.5, 1.9 before 1.9.4, and 1.10 before 1.10.2 allow remote authenticated users to obtain sensitive information from process memory or cause a denial of service (crash) via a long string in the last key value in the variable list to the process_cgivars function in (1) avail.c, (2) cmd.c, (3) config.c, (4) extinfo.c, (5) histogram.c, (6) notifications.c, (7) outages.c, (8) status.c, (9) statusmap.c, (10) summary.c, and (11) trends.c in cgi/, which triggers a heap-based buffer over-read.
Vendor | Product | Version | CPE |
---|---|---|---|
nagios | nagios | * | cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:* |
nagios | nagios | 3.0 | cpe:2.3:a:nagios:nagios:3.0:*:*:*:*:*:*:* |
nagios | nagios | 3.0 | cpe:2.3:a:nagios:nagios:3.0:alpha1:*:*:*:*:*:* |
nagios | nagios | 3.0 | cpe:2.3:a:nagios:nagios:3.0:alpha2:*:*:*:*:*:* |
nagios | nagios | 3.0 | cpe:2.3:a:nagios:nagios:3.0:alpha3:*:*:*:*:*:* |
nagios | nagios | 3.0 | cpe:2.3:a:nagios:nagios:3.0:alpha4:*:*:*:*:*:* |
nagios | nagios | 3.0 | cpe:2.3:a:nagios:nagios:3.0:alpha5:*:*:*:*:*:* |
nagios | nagios | 3.0 | cpe:2.3:a:nagios:nagios:3.0:beta1:*:*:*:*:*:* |
nagios | nagios | 3.0 | cpe:2.3:a:nagios:nagios:3.0:beta2:*:*:*:*:*:* |
nagios | nagios | 3.0 | cpe:2.3:a:nagios:nagios:3.0:beta3:*:*:*:*:*:* |
lists.opensuse.org/opensuse-updates/2014-01/msg00010.html
lists.opensuse.org/opensuse-updates/2014-01/msg00028.html
lists.opensuse.org/opensuse-updates/2014-01/msg00046.html
lists.opensuse.org/opensuse-updates/2014-01/msg00068.html
secunia.com/advisories/55976
secunia.com/advisories/56316
sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/
www.mandriva.com/security/advisories?name=MDVSA-2014:004
www.openwall.com/lists/oss-security/2013/12/24/1
www.securityfocus.com/bid/64363
dev.icinga.org/issues/5251
lists.debian.org/debian-lts-announce/2018/12/msg00014.html
www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/