New upstream nagios-plugins version 1.4.10 was released recently with following fix: "Fix check_http buffer overflow vulnerability when following HTTP redirects" Release notes: http://sourceforge.net/forum/forum.php?forum_id=740172 SF.net bug report: http://sourceforge.net/tracker/index.php?func=detail&aid=1687867&group_id=29880&atid=397597 Relevant CVS commit: http://nagiosplug.cvs.sourceforge.net/nagiosplug/nagiosplug/plugins/check_http.c?r1=1.106&r2=1.107 Workaround: do to follow redirects for untrusted servers (see -f option) No CVE id known at the moment.
CVE name CVE-2007-5198 was assigned to this vulnerability.
Additional check_http buffer overflow was reported, which is not fixed in 1.4.10: http://sourceforge.net/tracker/index.php?func=detail&aid=1813346&group_id=29880&atid=397597 Upstream SVN commit: http://nagiosplug.svn.sourceforge.net/viewvc/nagiosplug/nagiosplug/trunk/plugins/check_http.c?r1=1804&r2=1807 Again, this issue affects redirection handling code (see workaround above).
nagios-plugins-1.4.11-2.fc8 has been pushed to the Fedora 8 stable repository. If problems still persist, please make note of it in this bug report.
nagios-plugins-1.4.11-2.fc7 has been pushed to the Fedora 7 stable repository. If problems still persist, please make note of it in this bug report.
Patch mentioned in comment #2 is applied in upstream 1.4.11, which is in Fedora archive now.