Red Hat Bugzilla – Bug 893269
CVE-2012-6096 nagios: stack-based buffer overflow in history.cgi
Last modified: 2016-03-04 07:07:48 EST
It was reported  that Nagios Core's history.cgi is vulnerable to a buffer overflow because it used sprintf on user-supplied data that was not restricted in size.
Due to various protections of the operating system (history.cgi is compiled with SSP, FORTIFY_SOURCE is enabled, etc.) this is not believed to be exploitable and would result in a denial of service to the user sending the input to history.cgi.
This has been fixed in svn (r2547).
Created nagios tracking bugs for this issue
Affects: fedora-all [bug 893270]
Affects: epel-6 [bug 893271]
* Nagios Core 3.4.4 Released
Saturday, 12 January 2013 07:53
* Nagios Core 3.x Version History
3.4.4 - 01/12/2013
Reenabled check for newer versions of Nagios Core (Mike Guthrie)
Fixed bug #408: service checks get duplicated on reload (Eric Stanley)
Fixed bug #401: segmentation fault on Solaris when parsing unknown timeperiod directives. (Eric Stanley)
Added NULL pointer checks to CGI code. (Eric Stanley)
Fixed buffer overflow vulnerability in CGI code. Thanks to Neohapsis (http://archives.neohapsis.com/archives/fulldisclosure/2012-1/0108.html) for finding this. (Eric Stanley)
nagios-3.4.4-1.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report.
nagios-3.4.4-1.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.
nagios-3.4.4-1.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.
nagios-3.4.4-1.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.