Multiple stack-based buffer overflows in Icinga before 1.8.5, 1.9 before 1.9.4, and 1.10 before 1.10.2 allow remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a long string to the (1) display_nav_table, (2) page_limit_selector, (3) print_export_link, or (4) page_num_selector function in cgi/cgiutils.c; (5) status_page_num_selector function in cgi/status.c; or (6) display_command_expansion function in cgi/config.c. NOTE: this can be exploited without authentication by leveraging CVE-2013-7107.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2013/12/16/4 - | |
References | () https://dev.icinga.org/issues/5250 - | |
References | () https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/ - Vendor Advisory |
Information
Published : 2014-01-15 16:08
Updated : 2024-11-21 02:00
NVD link : CVE-2013-7106
Mitre link : CVE-2013-7106
CVE.ORG link : CVE-2013-7106
JSON object : View
Products Affected
icinga
- icinga
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer