7.5
CVSSv2

CVE-2006-2489

Published: 19/05/2006 Updated: 03/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Integer overflow in CGI scripts in Nagios 1.x prior to 1.4.1 and 2.x prior to 2.3.1 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a content length (Content-Length) HTTP header. NOTE: this is a different vulnerability than CVE-2006-2162.

Vulnerable Product Search on Vulmon Subscribe to Product

nagios nagios 1.0

nagios nagios 1.0b1

nagios nagios 1.2

nagios nagios 1.3

nagios nagios 2.0b5

nagios nagios 2.0b6

nagios nagios 1.0b2

nagios nagios 1.0b3

nagios nagios 1.4

nagios nagios 2.0

nagios nagios 2.0rc1

nagios nagios 2.0rc2

nagios nagios 1.0b6

nagios nagios 1.1

nagios nagios 2.0b3

nagios nagios 2.0b4

nagios nagios 2.3

nagios nagios 1.0b4

nagios nagios 1.0b5

nagios nagios 2.0b1

nagios nagios 2.0b2

nagios nagios 2.1

nagios nagios 2.2

Vendor Advisories

The nagios CGI scripts did not sufficiently check the validity of the HTTP Content-Length attribute By sending a specially crafted HTTP request with an invalidly large Content-Length value to the Nagios server, a remote attacker could exploit this to execute arbitrary code with web server privileges ...
A buffer overflow has been discovered in nagios, a host, service and network monitoring and management system, that could be exploited by remote attackers to execute arbitrary code The old stable distribution (woody) does not contain nagios packages For the stable distribution (sarge) this problem has been fixed in version 13-cvs20050402-2sarg ...