CVE-2014-2913 Affecting nagios-nrpe package, versions <2.15-1


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

Exploit Maturity
Mature
EPSS
14.57% (96th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN8-NAGIOSNRPE-277214
  • published7 May 2014
  • disclosed7 May 2014

Introduced: 7 May 2014

CVE-2014-2913  (opens in a new tab)

How to fix?

Upgrade Debian:8 nagios-nrpe to version 2.15-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream nagios-nrpe package and not the nagios-nrpe package as distributed by Debian. See How to fix? for Debian:8 relevant fixed versions and status.

Incomplete blacklist vulnerability in nrpe.c in Nagios Remote Plugin Executor (NRPE) 2.15 and earlier allows remote attackers to execute arbitrary commands via a newline character in the -a option to libexec/check_nrpe. NOTE: this issue is disputed by multiple parties. It has been reported that the vendor allows newlines as "expected behavior." Also, this issue can only occur when the administrator enables the "dont_blame_nrpe" option in nrpe.conf despite the "HIGH security risk" warning within the comments

CVSS Scores

version 3.1