Lucene search

K
nvd[email protected]NVD:CVE-2013-7108
HistoryJan 15, 2014 - 4:08 p.m.

CVE-2013-7108

2014-01-1516:08:04
CWE-20
web.nvd.nist.gov

5.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:N/A:P

7.3 High

AI Score

Confidence

High

0.941 High

EPSS

Percentile

99.2%

Multiple off-by-one errors in Nagios Core 3.5.1, 4.0.2, and earlier, and Icinga before 1.8.5, 1.9 before 1.9.4, and 1.10 before 1.10.2 allow remote authenticated users to obtain sensitive information from process memory or cause a denial of service (crash) via a long string in the last key value in the variable list to the process_cgivars function in (1) avail.c, (2) cmd.c, (3) config.c, (4) extinfo.c, (5) histogram.c, (6) notifications.c, (7) outages.c, (8) status.c, (9) statusmap.c, (10) summary.c, and (11) trends.c in cgi/, which triggers a heap-based buffer over-read.

Affected configurations

NVD
Node
nagiosnagiosRange4.0.2
OR
nagiosnagiosMatch3.0
OR
nagiosnagiosMatch3.0alpha1
OR
nagiosnagiosMatch3.0alpha2
OR
nagiosnagiosMatch3.0alpha3
OR
nagiosnagiosMatch3.0alpha4
OR
nagiosnagiosMatch3.0alpha5
OR
nagiosnagiosMatch3.0beta1
OR
nagiosnagiosMatch3.0beta2
OR
nagiosnagiosMatch3.0beta3
OR
nagiosnagiosMatch3.0beta4
OR
nagiosnagiosMatch3.0beta5
OR
nagiosnagiosMatch3.0beta6
OR
nagiosnagiosMatch3.0beta7
OR
nagiosnagiosMatch3.0rc1
OR
nagiosnagiosMatch3.0rc2
OR
nagiosnagiosMatch3.0rc3
OR
nagiosnagiosMatch3.0.1
OR
nagiosnagiosMatch3.0.2
OR
nagiosnagiosMatch3.0.3
OR
nagiosnagiosMatch3.0.4
OR
nagiosnagiosMatch3.0.5
OR
nagiosnagiosMatch3.0.6
OR
nagiosnagiosMatch3.1.0
OR
nagiosnagiosMatch3.1.1
OR
nagiosnagiosMatch3.1.2
OR
nagiosnagiosMatch3.2.0
OR
nagiosnagiosMatch3.2.1
OR
nagiosnagiosMatch3.2.2
OR
nagiosnagiosMatch3.2.3
OR
nagiosnagiosMatch3.3.1
OR
nagiosnagiosMatch3.4.0
OR
nagiosnagiosMatch3.4.1
OR
nagiosnagiosMatch3.4.2
OR
nagiosnagiosMatch3.4.3
OR
nagiosnagiosMatch3.5.1
Node
icingaicingaRange1.8.4
OR
icingaicingaMatch0.8.0
OR
icingaicingaMatch0.8.1
OR
icingaicingaMatch0.8.2
OR
icingaicingaMatch0.8.3
OR
icingaicingaMatch0.8.4
OR
icingaicingaMatch1.0
OR
icingaicingaMatch1.0rc1
OR
icingaicingaMatch1.0.1
OR
icingaicingaMatch1.0.2
OR
icingaicingaMatch1.0.3
OR
icingaicingaMatch1.2.0
OR
icingaicingaMatch1.2.1
OR
icingaicingaMatch1.3.0
OR
icingaicingaMatch1.3.1
OR
icingaicingaMatch1.4.0
OR
icingaicingaMatch1.4.1
OR
icingaicingaMatch1.6.0
OR
icingaicingaMatch1.6.1
OR
icingaicingaMatch1.6.2
OR
icingaicingaMatch1.7.0
OR
icingaicingaMatch1.7.1
OR
icingaicingaMatch1.7.2
OR
icingaicingaMatch1.7.3
OR
icingaicingaMatch1.7.4
OR
icingaicingaMatch1.8.0
OR
icingaicingaMatch1.8.1
OR
icingaicingaMatch1.8.2
OR
icingaicingaMatch1.8.3
OR
icingaicingaMatch1.9.0
OR
icingaicingaMatch1.9.1
OR
icingaicingaMatch1.9.2
OR
icingaicingaMatch1.9.3
OR
icingaicingaMatch1.10.0
OR
icingaicingaMatch1.10.1

5.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:N/A:P

7.3 High

AI Score

Confidence

High

0.941 High

EPSS

Percentile

99.2%