Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1066578 - (CVE-2014-1878) CVE-2014-1878 nagios: possible buffer overflows in cmd.cgi
CVE-2014-1878 nagios: possible buffer overflows in cmd.cgi
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20140211,repor...
: Security
Depends On: 1066580 1066582
Blocks: 1066579
  Show dependency treegraph
 
Reported: 2014-02-18 11:35 EST by Vincent Danen
Modified: 2018-01-30 18:44 EST (History)
18 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Vincent Danen 2014-02-18 11:35:02 EST
A potential buffer overflow vulnerability was reported in Icinga [1],[2] which could possibly be exploited by remote attackers to cause a denial of service.  This vulnerability is caused due to a boundary error in the cmd_submitf() function.  This code in Icinga originated in Nagios, and a visual inspection of the code indicates Nagios is likewise affected.

CVE-2014-1878 was assigned to Icinga, however given that the code is identical and has the same origin (Nagios is the originator) the same CVE should also apply to Nagios.

This is fixed in Icinga git [3].

[1] https://www.icinga.org/2014/02/11/bugfix-releases-1-10-3-1-9-5-1-8-6/
[2] https://dev.icinga.org/issues/5434
[3] https://dev.icinga.org/projects/icinga-core/repository/revisions/eedf4f7d88cdc50843572224eb38a2f5c78a2dc5
Comment 1 Vincent Danen 2014-02-18 11:38:33 EST
Created nagios tracking bugs for this issue:

Affects: fedora-all [bug 1066580]
Affects: epel-6 [bug 1066582]

Note You need to log in before you can comment on or make changes to this bug.