Improper Input Validation Affecting nagios3 package, versions <3.5.1.dfsg-2.1ubuntu3.1


Severity

Recommended
low

Based on Ubuntu security rating.

Threat Intelligence

EPSS
92.14% (100th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Input Validation vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UBUNTU1610-NAGIOS3-326337
  • published15 Jan 2014
  • disclosed15 Jan 2014

Introduced: 15 Jan 2014

CVE-2013-7108  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

Upgrade Ubuntu:16.10 nagios3 to version 3.5.1.dfsg-2.1ubuntu3.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream nagios3 package and not the nagios3 package as distributed by Ubuntu. See How to fix? for Ubuntu:16.10 relevant fixed versions and status.

Multiple off-by-one errors in Nagios Core 3.5.1, 4.0.2, and earlier, and Icinga before 1.8.5, 1.9 before 1.9.4, and 1.10 before 1.10.2 allow remote authenticated users to obtain sensitive information from process memory or cause a denial of service (crash) via a long string in the last key value in the variable list to the process_cgivars function in (1) avail.c, (2) cmd.c, (3) config.c, (4) extinfo.c, (5) histogram.c, (6) notifications.c, (7) outages.c, (8) status.c, (9) statusmap.c, (10) summary.c, and (11) trends.c in cgi/, which triggers a heap-based buffer over-read.

CVSS Scores

version 3.1