Debian DSA-1825-1 : nagios2, nagios3 - insufficient input validation

high Nessus Plugin ID 44690

Language:

Synopsis

The remote Debian host is missing a security-related update.

Description

It was discovered that the statuswml.cgi script of nagios, a monitoring and management system for hosts, services and networks, is prone to a command injection vulnerability. Input to the ping and traceroute parameters of the script is not properly validated which allows an attacker to execute arbitrary shell commands by passing a crafted value to these parameters.

Solution

Upgrade the nagios2/nagios3 packages.

For the oldstable distribution (etch), this problem has been fixed in version 2.6-2+etch3 of nagios2.

For the stable distribution (lenny), this problem has been fixed in version 3.0.6-4~lenny2 of nagios3.

See Also

https://www.debian.org/security/2009/dsa-1825

Plugin Details

Severity: High

ID: 44690

File Name: debian_DSA-1825.nasl

Version: 1.16

Type: local

Agent: unix

Published: 2/24/2010

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:debian:debian_linux:5.0, p-cpe:/a:debian:debian_linux:nagios3, cpe:/o:debian:debian_linux:4.0, p-cpe:/a:debian:debian_linux:nagios2

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/3/2009

Vulnerability Publication Date: 7/1/2009

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (Nagios3 statuswml.cgi Ping Command Execution)

Elliot (Nagios 3.1.0 RCE)

Reference Information

CVE: CVE-2009-2288

BID: 35464

CWE: 78

DSA: 1825