#VU32699 Stack-based buffer overflow in Nagios - CVE-2012-6096
Published: January 23, 2013 / Updated: July 29, 2020
Nagios
nagios.org
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing a long (1) host_name variable (host parameter) or (2) svc_description variable. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- http://lists.grok.org.uk/pipermail/full-disclosure/2012-December/089125.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00033.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00060.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00077.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00088.html
- http://secunia.com/advisories/51863
- http://www.debian.org/security/2013/dsa-2616
- http://www.debian.org/security/2013/dsa-2653
- http://www.exploit-db.com/exploits/24084
- http://www.exploit-db.com/exploits/24159
- http://www.nagios.org/projects/nagioscore/history/core-3x
- http://www.osvdb.org/89170
- http://www.securityfocus.com/bid/56879
- https://bugzilla.redhat.com/show_bug.cgi?id=893269
- https://dev.icinga.org/issues/3532
- https://www.icinga.org/2013/01/14/icinga-1-6-2-1-7-4-1-8-4-released/