nagios3: CVE-2014-1878: buffer overflow in cmd.cgi

Related Vulnerabilities: CVE-2014-1878  

Debian Bug report logs - #823721
nagios3: CVE-2014-1878: buffer overflow in cmd.cgi

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Sun, 8 May 2016 04:12:02 UTC

Severity: important

Tags: security, upstream

Found in version nagios3/3.4.1-1

Fixed in versions nagios3/3.4.1-3+deb7u2, 3.5.1.dfsg-2.2+rm

Done: Debian FTP Masters <ftpmaster@ftp-master.debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Debian Nagios Maintainer Group <pkg-nagios-devel@lists.alioth.debian.org>:
Bug#823721; Package src:nagios3. (Sun, 08 May 2016 04:12:05 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Debian Nagios Maintainer Group <pkg-nagios-devel@lists.alioth.debian.org>. (Sun, 08 May 2016 04:12:06 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: nagios3: CVE-2014-1878: buffer overflow in cmd.cgi
Date: Sun, 08 May 2016 06:08:10 +0200
Source: nagios3
Version: 3.4.1-1
Severity: important
Tags: security upstream

Hi,

the following vulnerability was published for nagios3.

CVE-2014-1878[0]:
| Stack-based buffer overflow in the cmd_submitf function in cgi/cmd.c
| in Nagios Core, possibly 4.0.3rc1 and earlier, and Icinga before
| 1.8.6, 1.9 before 1.9.5, and 1.10 before 1.10.3 allows remote
| attackers to cause a denial of service (segmentation fault) via a long
| message to cmd.cgi.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2014-1878

Regards,
Salvatore



Marked as fixed in versions nagios3/3.4.1-3+deb7u2. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sun, 08 May 2016 04:18:03 GMT) (full text, mbox, link).


Reply sent to Debian FTP Masters <ftpmaster@ftp-master.debian.org>:
You have taken responsibility. (Sat, 26 Nov 2016 18:43:32 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Sat, 26 Nov 2016 18:43:32 GMT) (full text, mbox, link).


Message #12 received at 823721-done@bugs.debian.org (full text, mbox, reply):

From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
To: 479330-done@bugs.debian.org,479331-done@bugs.debian.org,479335-done@bugs.debian.org,479337-done@bugs.debian.org,479340-done@bugs.debian.org,485469-done@bugs.debian.org,497513-done@bugs.debian.org,506900-done@bugs.debian.org,508263-done@bugs.debian.org,538828-done@bugs.debian.org,546537-done@bugs.debian.org,550304-done@bugs.debian.org,578231-done@bugs.debian.org,578234-done@bugs.debian.org,579067-done@bugs.debian.org,580294-done@bugs.debian.org,584949-done@bugs.debian.org,597332-done@bugs.debian.org,608455-done@bugs.debian.org,610694-done@bugs.debian.org,610751-done@bugs.debian.org,612737-done@bugs.debian.org,619141-done@bugs.debian.org,630727-done@bugs.debian.org,634252-done@bugs.debian.org,634839-done@bugs.debian.org,661660-done@bugs.debian.org,686256-done@bugs.debian.org,714290-done@bugs.debian.org,724883-done@bugs.debian.org,725268-done@bugs.debian.org,725826-done@bugs.debian.org,727675-done@bugs.debian.org,731138-done@bugs.debian.org,734453-done@bugs.debian.org,771466-done@bugs.debian.org,773440-done@bugs.debian.org,776118-done@bugs.debian.org,790044-done@bugs.debian.org,792787-done@bugs.debian.org,794976-done@bugs.debian.org,812392-done@bugs.debian.org,816916-done@bugs.debian.org,816917-done@bugs.debian.org,823721-done@bugs.debian.org,831698-done@bugs.debian.org,836828-done@bugs.debian.org,845777-done@bugs.debian.org,
Cc: nagios3@packages.debian.org, nagios3@packages.qa.debian.org
Subject: Bug#845765: Removed package(s) from unstable
Date: Sat, 26 Nov 2016 18:38:14 +0000
Version: 3.5.1.dfsg-2.2+rm

Dear submitter,

as the package nagios3 has just been removed from the Debian archive
unstable we hereby close the associated bug reports.  We are sorry
that we couldn't deal with your issue properly.

For details on the removal, please see https://bugs.debian.org/845765

The version of this package that was in Debian prior to this removal
can still be found using http://snapshot.debian.org/.

This message was generated automatically; if you believe that there is
a problem with it please contact the archive administrators by mailing
ftpmaster@ftp-master.debian.org.

Debian distribution maintenance software
pp.
Scott Kitterman (the ftpmaster behind the curtain)



Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Thu, 29 Dec 2016 07:55:50 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 15:28:38 2019; Machine Name: beach

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.