CVE-2017-14955

Check_MK before 1.2.8p26 mishandles certain errors within the failed-login save feature because of a race condition, which allows remote attackers to obtain sensitive user information by reading a GUI crash report.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:checkmk:checkmk:1.2.3:i6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.3:i7:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.4:b1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.5:i1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.5:i2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.5:i3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.5:i4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.5:i5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.5:i6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.6:b1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.6:b2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.6:p13:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.7:i1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.7:i1p2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.7:i2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.7:i3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.7:i4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.8:p18:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.8:p25:*:*:*:*:*:*

History

21 Nov 2024, 03:13

Type Values Removed Values Added
References () http://mathias-kettner.com/check_mk_werks.php?edition_id=raw&branch=1.2.8 - Release Notes, Third Party Advisory () http://mathias-kettner.com/check_mk_werks.php?edition_id=raw&branch=1.2.8 - Release Notes, Third Party Advisory
References () https://mathias-kettner.de/check_mk_werks.php?werk_id=5208&HTML=yes - Third Party Advisory () https://mathias-kettner.de/check_mk_werks.php?werk_id=5208&HTML=yes - Third Party Advisory
References () https://www.exploit-db.com/exploits/43021/ - Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/43021/ - Third Party Advisory, VDB Entry

23 Jul 2024, 19:37

Type Values Removed Values Added
CPE cpe:2.3:a:tribe29:checkmk:1.2.6:b2:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.2.8:p18:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.2.7:i4:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.2.7:i1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.2.6:p13:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.2.7:i3:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.2.8:p25:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.2.7:i2:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.2.7:i1p2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.7:i1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.8:p25:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.7:i2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.6:b2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.7:i1p2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.7:i3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.8:p18:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.7:i4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.6:p13:*:*:*:*:*:*

23 Jul 2024, 19:20

Type Values Removed Values Added
CPE cpe:2.3:a:tribe29:checkmk:1.2.5:i4:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.2.5:i2:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.2.3:i7:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.2.5:i6:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.2.5:i5:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.2.6:b1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.2.5:i1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.2.4:b1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.2.5:i3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.5:i4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.4:b1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.5:i3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.5:i5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.6:b1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.3:i7:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.5:i1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.5:i6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.2.5:i2:*:*:*:*:*:*

23 Jul 2024, 18:58

Type Values Removed Values Added
First Time Checkmk checkmk
Checkmk
CPE cpe:2.3:a:tribe29:checkmk:1.2.3:i6:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:1.2.3:i6:*:*:*:*:*:*

Information

Published : 2017-10-02 01:29

Updated : 2024-11-21 03:13


NVD link : CVE-2017-14955

Mitre link : CVE-2017-14955

CVE.ORG link : CVE-2017-14955


JSON object : View

Products Affected

checkmk

  • checkmk
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')