Bug 983673 (CVE-2013-4114)

Summary: CVE-2013-4114 nagstamon: Monitor server user credentials exposure in automated requests to get update information
Product: [Other] Security Response Reporter: Jan Lieskovsky <jlieskov>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: urgent Docs Contact:
Priority: urgent    
Version: unspecifiedCC: echevemaster, nk, rcvalle
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Nagstamon-0.9.10 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-07-16 06:12:30 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 983675    
Bug Blocks:    

Description Jan Lieskovsky 2013-07-11 16:59:39 UTC
An user details information exposure flaw was found in the way Nagstamon, Nagios status monitor for desktop, performed automated requests to get information about available updates. Remote attacker could use this flaw to obtain user credentials for server monitored by the desktop status monitor due to their improper (base64 encoding based) encoding in the HTTP request, when the HTTP Basic authentication scheme was used.

References:
[1] http://nagstamon.ifw-dresden.de/docs/security/

Comment 1 Jan Lieskovsky 2013-07-11 17:02:09 UTC
This issue affects the versions of the nagstamon package, as shipped with Fedora release of 18 and 19. Please schedule an update.

Comment 2 Jan Lieskovsky 2013-07-11 17:02:52 UTC
Created nagstamon tracking bugs for this issue:

Affects: fedora-all [bug 983675]

Comment 3 Jan Lieskovsky 2013-07-11 17:08:35 UTC
CVE Request:
  http://www.openwall.com/lists/oss-security/2013/07/11/3

Comment 4 Jan Lieskovsky 2013-07-12 09:41:56 UTC
The CVE identifier of CVE-2013-4114 has been assigned to this issue:
  http://www.openwall.com/lists/oss-security/2013/07/11/7

Comment 5 Jan Lieskovsky 2013-07-12 10:15:33 UTC
Reply from Henry Wahl of nagstamon upstream regarding the fix availability for 0.9.9 version:

Hi,
For those who want to fix a 0.9.9 package there is an updated version at
Github:
https://github.com/HenriWahl/Nagstamon/tree/0.9.9.1 .
Anyway it is a better idea to upgrade to 0.9.10.

Regards
Henri


-- 
Henri Wahl

IT Department
Leibniz-Institut für Festkoerper- u.
Werkstoffforschung Dresden

Comment 6 Nikita Klimov 2013-07-12 10:26:20 UTC
Hi,
I'm nagstamon maintainer. Updated version without security hole available in updates-testing repo, for update:

yum --enablerepo=updates-testing update nagstamon

It's actual for Fedora 18 and 19.  I'll update nagstamon to 0.9.10 after updates, that's now in testing, will be pushed to updates stable repo.