6.8
CVSSv2

CVE-2007-5198

Published: 04/10/2007 Updated: 08/03/2011
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 685
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in the redir function in check_http.c in Nagios Plugins prior to 1.4.10, when running with the -f (follow) option, allows remote web servers to execute arbitrary code via Location header responses (redirects) with a large number of leading "L" characters.

Vulnerable Product Search on Vulmon Subscribe to Product

nagios plugins

Vendor Advisories

Nobuhiro Ban discovered that check_http in nagios-plugins did not properly sanitize its input when following redirection requests A malicious remote web server could cause a denial of service or possibly execute arbitrary code as the user (CVE-2007-5198) ...
Several local/remote vulnerabilities have been discovered in two of the plugins for the Nagios network monitoring and management system The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-5198 A buffer overflow has been discovered in the parser for HTTP Location headers (present in the check_http m ...

Exploits

source: wwwsecurityfocuscom/bid/25952/info Nagios Plugins are prone to a remote buffer-overflow vulnerability because the software fails to properly bounds-check user-supplied data before copying it to an insufficiently sized buffer Exploiting this issue allows attackers to execute arbitrary machine code in the context of users running ...