[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] [ MDVSA-2009:187 ] nagios
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: [Full-disclosure] [ MDVSA-2009:187 ] nagios
- From: security@xxxxxxxxxxxx
- Date: Sat, 01 Aug 2009 04:40:00 +0200
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2009:187
http://www.mandriva.com/security/
_______________________________________________________________________
Package : nagios
Date : August 1, 2009
Affected: Corporate 4.0, Enterprise Server 5.0
_______________________________________________________________________
Problem Description:
A vulnerability has been found and corrected in nagios:
statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute
arbitrary commands via shell metacharacters in the (1) ping or (2)
Traceroute parameters (CVE-2009-2288).
This update provides nagios 3.1.2, which is not vulnerable to this
issue.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2288
_______________________________________________________________________
Updated Packages:
Corporate 4.0:
7472e8523c46ca410cefd9409a179268
corporate/4.0/i586/nagios-3.1.2-0.1.20060mlcs4.i586.rpm
89a90ebea94c9b6be5b96b29b057e941
corporate/4.0/i586/nagios-devel-3.1.2-0.1.20060mlcs4.i586.rpm
ed9c5a112b2da874d94d77d9e487295f
corporate/4.0/i586/nagios-theme-default-3.1.2-0.1.20060mlcs4.i586.rpm
1b5be207136af2bea3c57a6cae095d1f
corporate/4.0/i586/nagios-www-3.1.2-0.1.20060mlcs4.i586.rpm
8727421dc7496303fbd8f61d2ad9ad7b
corporate/4.0/SRPMS/nagios-3.1.2-0.1.20060mlcs4.src.rpm
Corporate 4.0/X86_64:
0327db2ac9b511fa72c4a4ac7349ee0a
corporate/4.0/x86_64/nagios-3.1.2-0.1.20060mlcs4.x86_64.rpm
7a36ca1cb34667d84d78f9b0b48f2976
corporate/4.0/x86_64/nagios-devel-3.1.2-0.1.20060mlcs4.x86_64.rpm
a81e17fc9f68d97674c252f0266d6502
corporate/4.0/x86_64/nagios-theme-default-3.1.2-0.1.20060mlcs4.x86_64.rpm
6b4da1474cc9b4931fa8dcbe7f9b75ef
corporate/4.0/x86_64/nagios-www-3.1.2-0.1.20060mlcs4.x86_64.rpm
8727421dc7496303fbd8f61d2ad9ad7b
corporate/4.0/SRPMS/nagios-3.1.2-0.1.20060mlcs4.src.rpm
Mandriva Enterprise Server 5:
248bc01aab687002a8358916e7b3fc82 mes5/i586/nagios-3.1.2-0.2mdvmes5.i586.rpm
44aeb0da66acda1d01549f56a190800f
mes5/i586/nagios-devel-3.1.2-0.2mdvmes5.i586.rpm
305cefdd9a47d7ce8ab6a4fd388f02d6
mes5/i586/nagios-theme-default-3.1.2-0.2mdvmes5.i586.rpm
3333d2362e45a46a0eccbeed8719435e
mes5/i586/nagios-www-3.1.2-0.2mdvmes5.i586.rpm
e66cb2c237aed7e1e96251054a191413 mes5/SRPMS/nagios-3.1.2-0.2mdvmes5.src.rpm
Mandriva Enterprise Server 5/X86_64:
6c37a65ce53a4795fe78747d2aa3b25c
mes5/x86_64/nagios-3.1.2-0.2mdvmes5.x86_64.rpm
b58de355fcb5f7fac50dc251c3ebbd54
mes5/x86_64/nagios-devel-3.1.2-0.2mdvmes5.x86_64.rpm
5dd3dca4fbb5530382d8b3aeb4fcf5b0
mes5/x86_64/nagios-theme-default-3.1.2-0.2mdvmes5.x86_64.rpm
3a216297c88bbf869440b3594ec27027
mes5/x86_64/nagios-www-3.1.2-0.2mdvmes5.x86_64.rpm
e66cb2c237aed7e1e96251054a191413 mes5/SRPMS/nagios-3.1.2-0.2mdvmes5.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFKc4A/mqjQ0CJFipgRAoifAJ9WmG+u08se/DyR2TjZ2GX+nRpyLgCgkiKo
DqUpIY99w28fMGbbq0S+quY=
=0LGX
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/