5
CVSSv2

CVE-2006-2162

Published: 03/05/2006 Updated: 03/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

Buffer overflow in CGI scripts in Nagios 1.x prior to 1.4 and 2.x prior to 2.3 allows remote malicious users to execute arbitrary code via a negative content length (Content-Length) HTTP header.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

nagios nagios

Vendor Advisories

The nagios CGI scripts did not sufficiently check the validity of the HTTP Content-Length attribute By sending a specially crafted HTTP request with a negative Content-Length value to the Nagios server, a remote attacker could exploit this to execute arbitrary code with web server privileges ...
A buffer overflow has been discovered in nagios, a host, service and network monitoring and management system, that could be exploited by remote attackers to execute arbitrary code The old stable distribution (woody) does not contain nagios packages For the stable distribution (sarge) this problem has been fixed in version 13-cvs20050402-2sarg ...