Bug 983673 (CVE-2013-4114) - CVE-2013-4114 nagstamon: Monitor server user credentials exposure in automated requests to get update information
Summary: CVE-2013-4114 nagstamon: Monitor server user credentials exposure in automate...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2013-4114
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
urgent
urgent
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 983675
Blocks:
TreeView+ depends on / blocked
 
Reported: 2013-07-11 16:59 UTC by Jan Lieskovsky
Modified: 2019-09-29 13:05 UTC (History)
3 users (show)

Fixed In Version: Nagstamon-0.9.10
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2013-07-16 06:12:30 UTC


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Gentoo 476538 0 None None None Never

Description Jan Lieskovsky 2013-07-11 16:59:39 UTC
An user details information exposure flaw was found in the way Nagstamon, Nagios status monitor for desktop, performed automated requests to get information about available updates. Remote attacker could use this flaw to obtain user credentials for server monitored by the desktop status monitor due to their improper (base64 encoding based) encoding in the HTTP request, when the HTTP Basic authentication scheme was used.

References:
[1] http://nagstamon.ifw-dresden.de/docs/security/

Comment 1 Jan Lieskovsky 2013-07-11 17:02:09 UTC
This issue affects the versions of the nagstamon package, as shipped with Fedora release of 18 and 19. Please schedule an update.

Comment 2 Jan Lieskovsky 2013-07-11 17:02:52 UTC
Created nagstamon tracking bugs for this issue:

Affects: fedora-all [bug 983675]

Comment 3 Jan Lieskovsky 2013-07-11 17:08:35 UTC
CVE Request:
  http://www.openwall.com/lists/oss-security/2013/07/11/3

Comment 4 Jan Lieskovsky 2013-07-12 09:41:56 UTC
The CVE identifier of CVE-2013-4114 has been assigned to this issue:
  http://www.openwall.com/lists/oss-security/2013/07/11/7

Comment 5 Jan Lieskovsky 2013-07-12 10:15:33 UTC
Reply from Henry Wahl of nagstamon upstream regarding the fix availability for 0.9.9 version:

Hi,
For those who want to fix a 0.9.9 package there is an updated version at
Github:
https://github.com/HenriWahl/Nagstamon/tree/0.9.9.1 .
Anyway it is a better idea to upgrade to 0.9.10.

Regards
Henri


-- 
Henri Wahl

IT Department
Leibniz-Institut für Festkoerper- u.
Werkstoffforschung Dresden

Comment 6 Nikita Klimov 2013-07-12 10:26:20 UTC
Hi,
I'm nagstamon maintainer. Updated version without security hole available in updates-testing repo, for update:

yum --enablerepo=updates-testing update nagstamon

It's actual for Fedora 18 and 19.  I'll update nagstamon to 0.9.10 after updates, that's now in testing, will be pushed to updates stable repo.


Note You need to log in before you can comment on or make changes to this bug.