CVE-2016-9565

MagpieRSS, as used in the front-end component in Nagios Core before 4.2.2 might allow remote attackers to read or write to arbitrary files by spoofing a crafted response from the Nagios RSS feed server. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4796.
References
Link Resource
http://packetstormsecurity.com/files/140169/Nagios-Core-Curl-Command-Injection-Code-Execution.html Exploit Third Party Advisory VDB Entry
http://rhn.redhat.com/errata/RHSA-2017-0211.html
http://rhn.redhat.com/errata/RHSA-2017-0212.html
http://rhn.redhat.com/errata/RHSA-2017-0213.html
http://rhn.redhat.com/errata/RHSA-2017-0214.html
http://rhn.redhat.com/errata/RHSA-2017-0258.html
http://rhn.redhat.com/errata/RHSA-2017-0259.html
http://seclists.org/fulldisclosure/2016/Dec/57 Mailing List Third Party Advisory
http://www.securityfocus.com/archive/1/539925/100/0/threaded
http://www.securityfocus.com/bid/94922 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1037488
https://legalhackers.com/advisories/Nagios-Exploit-Command-Injection-CVE-2016-9565-2008-4796.html Exploit Third Party Advisory
https://security.gentoo.org/glsa/201702-26
https://security.gentoo.org/glsa/201710-20
https://www.exploit-db.com/exploits/40920/
https://www.nagios.org/projects/nagios-core/history/4x/ Vendor Advisory
http://packetstormsecurity.com/files/140169/Nagios-Core-Curl-Command-Injection-Code-Execution.html Exploit Third Party Advisory VDB Entry
http://rhn.redhat.com/errata/RHSA-2017-0211.html
http://rhn.redhat.com/errata/RHSA-2017-0212.html
http://rhn.redhat.com/errata/RHSA-2017-0213.html
http://rhn.redhat.com/errata/RHSA-2017-0214.html
http://rhn.redhat.com/errata/RHSA-2017-0258.html
http://rhn.redhat.com/errata/RHSA-2017-0259.html
http://seclists.org/fulldisclosure/2016/Dec/57 Mailing List Third Party Advisory
http://www.securityfocus.com/archive/1/539925/100/0/threaded
http://www.securityfocus.com/bid/94922 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1037488
https://legalhackers.com/advisories/Nagios-Exploit-Command-Injection-CVE-2016-9565-2008-4796.html Exploit Third Party Advisory
https://security.gentoo.org/glsa/201702-26
https://security.gentoo.org/glsa/201710-20
https://www.exploit-db.com/exploits/40920/
https://www.nagios.org/projects/nagios-core/history/4x/ Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:01

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/140169/Nagios-Core-Curl-Command-Injection-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/140169/Nagios-Core-Curl-Command-Injection-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () http://rhn.redhat.com/errata/RHSA-2017-0211.html - () http://rhn.redhat.com/errata/RHSA-2017-0211.html -
References () http://rhn.redhat.com/errata/RHSA-2017-0212.html - () http://rhn.redhat.com/errata/RHSA-2017-0212.html -
References () http://rhn.redhat.com/errata/RHSA-2017-0213.html - () http://rhn.redhat.com/errata/RHSA-2017-0213.html -
References () http://rhn.redhat.com/errata/RHSA-2017-0214.html - () http://rhn.redhat.com/errata/RHSA-2017-0214.html -
References () http://rhn.redhat.com/errata/RHSA-2017-0258.html - () http://rhn.redhat.com/errata/RHSA-2017-0258.html -
References () http://rhn.redhat.com/errata/RHSA-2017-0259.html - () http://rhn.redhat.com/errata/RHSA-2017-0259.html -
References () http://seclists.org/fulldisclosure/2016/Dec/57 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2016/Dec/57 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/archive/1/539925/100/0/threaded - () http://www.securityfocus.com/archive/1/539925/100/0/threaded -
References () http://www.securityfocus.com/bid/94922 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/94922 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1037488 - () http://www.securitytracker.com/id/1037488 -
References () https://legalhackers.com/advisories/Nagios-Exploit-Command-Injection-CVE-2016-9565-2008-4796.html - Exploit, Third Party Advisory () https://legalhackers.com/advisories/Nagios-Exploit-Command-Injection-CVE-2016-9565-2008-4796.html - Exploit, Third Party Advisory
References () https://security.gentoo.org/glsa/201702-26 - () https://security.gentoo.org/glsa/201702-26 -
References () https://security.gentoo.org/glsa/201710-20 - () https://security.gentoo.org/glsa/201710-20 -
References () https://www.exploit-db.com/exploits/40920/ - () https://www.exploit-db.com/exploits/40920/ -
References () https://www.nagios.org/projects/nagios-core/history/4x/ - Vendor Advisory () https://www.nagios.org/projects/nagios-core/history/4x/ - Vendor Advisory

Information

Published : 2016-12-15 22:59

Updated : 2024-11-21 03:01


NVD link : CVE-2016-9565

Mitre link : CVE-2016-9565

CVE.ORG link : CVE-2016-9565


JSON object : View

Products Affected

nagios

  • nagios
CWE
CWE-284

Improper Access Control