CVE-2013-7108

Multiple off-by-one errors in Nagios Core 3.5.1, 4.0.2, and earlier, and Icinga before 1.8.5, 1.9 before 1.9.4, and 1.10 before 1.10.2 allow remote authenticated users to obtain sensitive information from process memory or cause a denial of service (crash) via a long string in the last key value in the variable list to the process_cgivars function in (1) avail.c, (2) cmd.c, (3) config.c, (4) extinfo.c, (5) histogram.c, (6) notifications.c, (7) outages.c, (8) status.c, (9) statusmap.c, (10) summary.c, and (11) trends.c in cgi/, which triggers a heap-based buffer over-read.
References
Link Resource
http://lists.opensuse.org/opensuse-updates/2014-01/msg00010.html
http://lists.opensuse.org/opensuse-updates/2014-01/msg00028.html
http://lists.opensuse.org/opensuse-updates/2014-01/msg00046.html
http://lists.opensuse.org/opensuse-updates/2014-01/msg00068.html
http://secunia.com/advisories/55976 Vendor Advisory
http://secunia.com/advisories/56316 Vendor Advisory
http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/
http://www.mandriva.com/security/advisories?name=MDVSA-2014:004
http://www.openwall.com/lists/oss-security/2013/12/24/1
http://www.securityfocus.com/bid/64363
https://dev.icinga.org/issues/5251 Vendor Advisory
https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html
https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/
http://lists.opensuse.org/opensuse-updates/2014-01/msg00010.html
http://lists.opensuse.org/opensuse-updates/2014-01/msg00028.html
http://lists.opensuse.org/opensuse-updates/2014-01/msg00046.html
http://lists.opensuse.org/opensuse-updates/2014-01/msg00068.html
http://secunia.com/advisories/55976 Vendor Advisory
http://secunia.com/advisories/56316 Vendor Advisory
http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/
http://www.mandriva.com/security/advisories?name=MDVSA-2014:004
http://www.openwall.com/lists/oss-security/2013/12/24/1
http://www.securityfocus.com/bid/64363
https://dev.icinga.org/issues/5251 Vendor Advisory
https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html
https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.0:*:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.0:alpha3:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.0:alpha4:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.0:alpha5:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.0:beta1:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.0:beta2:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.0:beta3:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.0:beta4:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.0:beta5:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.0:beta6:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.0:beta7:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.0:rc1:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.0:rc2:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.0:rc3:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.0.5:*:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.0.6:*:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.2.3:*:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.3.1:*:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.4.0:*:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.4.1:*:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.4.2:*:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.4.3:*:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.5.1:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:0.8.0:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:0.8.3:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:0.8.4:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.0:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.7.0:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.7.2:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.7.3:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.7.4:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.8.0:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.8.1:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.8.2:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.8.3:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.9.0:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.9.1:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.9.2:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.9.3:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.10.0:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.10.1:*:*:*:*:*:*:*

History

21 Nov 2024, 02:00

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-updates/2014-01/msg00010.html - () http://lists.opensuse.org/opensuse-updates/2014-01/msg00010.html -
References () http://lists.opensuse.org/opensuse-updates/2014-01/msg00028.html - () http://lists.opensuse.org/opensuse-updates/2014-01/msg00028.html -
References () http://lists.opensuse.org/opensuse-updates/2014-01/msg00046.html - () http://lists.opensuse.org/opensuse-updates/2014-01/msg00046.html -
References () http://lists.opensuse.org/opensuse-updates/2014-01/msg00068.html - () http://lists.opensuse.org/opensuse-updates/2014-01/msg00068.html -
References () http://secunia.com/advisories/55976 - Vendor Advisory () http://secunia.com/advisories/55976 - Vendor Advisory
References () http://secunia.com/advisories/56316 - Vendor Advisory () http://secunia.com/advisories/56316 - Vendor Advisory
References () http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/ - () http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/ -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2014:004 - () http://www.mandriva.com/security/advisories?name=MDVSA-2014:004 -
References () http://www.openwall.com/lists/oss-security/2013/12/24/1 - () http://www.openwall.com/lists/oss-security/2013/12/24/1 -
References () http://www.securityfocus.com/bid/64363 - () http://www.securityfocus.com/bid/64363 -
References () https://dev.icinga.org/issues/5251 - Vendor Advisory () https://dev.icinga.org/issues/5251 - Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html - () https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html -
References () https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/ - () https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/ -

Information

Published : 2014-01-15 16:08

Updated : 2024-11-21 02:00


NVD link : CVE-2013-7108

Mitre link : CVE-2013-7108

CVE.ORG link : CVE-2013-7108


JSON object : View

Products Affected

icinga

  • icinga

nagios

  • nagios
CWE
CWE-20

Improper Input Validation