drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in nagios
Name: |
Ausführen beliebiger Kommandos in nagios |
|
ID: |
MDVSA-2009:187 |
|
Distribution: |
Mandriva |
|
Plattformen: |
Mandriva Corporate 4.0, Mandriva Enterprise Server 5.0 |
|
Datum: |
Sa, 1. August 2009, 04:42 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2288 |
|
Applikationen: |
Nagios |
|
Originalnachricht |
This is a multi-part message in MIME format...
------------=_1249094549-13155-560
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2009:187 http://www.mandriva.com/security/ _______________________________________________________________________
Package : nagios Date : August 1, 2009 Affected: Corporate 4.0, Enterprise Server 5.0 _______________________________________________________________________
Problem Description:
A vulnerability has been found and corrected in nagios: statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters (CVE-2009-2288). This update provides nagios 3.1.2, which is not vulnerable to this issue. _______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2288 _______________________________________________________________________
Updated Packages:
Corporate 4.0: 7472e8523c46ca410cefd9409a179268 corporate/4.0/i586/nagios-3.1.2-0.1.20060mlcs4.i586.rpm 89a90ebea94c9b6be5b96b29b057e941 corporate/4.0/i586/nagios-devel-3.1.2-0.1.20060mlcs4.i586.rpm ed9c5a112b2da874d94d77d9e487295f corporate/4.0/i586/nagios-theme-default-3.1.2-0.1.20060mlcs4.i586.rpm 1b5be207136af2bea3c57a6cae095d1f corporate/4.0/i586/nagios-www-3.1.2-0.1.20060mlcs4.i586.rpm 8727421dc7496303fbd8f61d2ad9ad7b corporate/4.0/SRPMS/nagios-3.1.2-0.1.20060mlcs4.src.rpm
Corporate 4.0/X86_64: 0327db2ac9b511fa72c4a4ac7349ee0a corporate/4.0/x86_64/nagios-3.1.2-0.1.20060mlcs4.x86_64.rpm 7a36ca1cb34667d84d78f9b0b48f2976 corporate/4.0/x86_64/nagios-devel-3.1.2-0.1.20060mlcs4.x86_64.rpm a81e17fc9f68d97674c252f0266d6502 corporate/4.0/x86_64/nagios-theme-default-3.1.2-0.1.20060mlcs4.x86_64.rpm 6b4da1474cc9b4931fa8dcbe7f9b75ef corporate/4.0/x86_64/nagios-www-3.1.2-0.1.20060mlcs4.x86_64.rpm 8727421dc7496303fbd8f61d2ad9ad7b corporate/4.0/SRPMS/nagios-3.1.2-0.1.20060mlcs4.src.rpm
Mandriva Enterprise Server 5: 248bc01aab687002a8358916e7b3fc82 mes5/i586/nagios-3.1.2-0.2mdvmes5.i586.rpm 44aeb0da66acda1d01549f56a190800f mes5/i586/nagios-devel-3.1.2-0.2mdvmes5.i586.rpm 305cefdd9a47d7ce8ab6a4fd388f02d6 mes5/i586/nagios-theme-default-3.1.2-0.2mdvmes5.i586.rpm 3333d2362e45a46a0eccbeed8719435e mes5/i586/nagios-www-3.1.2-0.2mdvmes5.i586.rpm e66cb2c237aed7e1e96251054a191413 mes5/SRPMS/nagios-3.1.2-0.2mdvmes5.src.rpm
Mandriva Enterprise Server 5/X86_64: 6c37a65ce53a4795fe78747d2aa3b25c mes5/x86_64/nagios-3.1.2-0.2mdvmes5.x86_64.rpm b58de355fcb5f7fac50dc251c3ebbd54 mes5/x86_64/nagios-devel-3.1.2-0.2mdvmes5.x86_64.rpm 5dd3dca4fbb5530382d8b3aeb4fcf5b0 mes5/x86_64/nagios-theme-default-3.1.2-0.2mdvmes5.x86_64.rpm 3a216297c88bbf869440b3594ec27027 mes5/x86_64/nagios-www-3.1.2-0.2mdvmes5.x86_64.rpm e66cb2c237aed7e1e96251054a191413 mes5/SRPMS/nagios-3.1.2-0.2mdvmes5.src.rpm _______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com _______________________________________________________________________
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFKc4A/mqjQ0CJFipgRAoifAJ9WmG+u08se/DyR2TjZ2GX+nRpyLgCgkiKo DqUpIY99w28fMGbbq0S+quY= =0LGX -----END PGP SIGNATURE-----
------------=_1249094549-13155-560 Content-Type: text/plain; name="message-footer.txt" Content-Disposition: inline; filename="message-footer.txt" Content-Transfer-Encoding: 8bit
To unsubscribe, send a email to sympa@mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://www.mandrivastore.com Join the Club : http://www.mandrivaclub.com _______________________________________________________
------------=_1249094549-13155-560--
|
|
|
|