Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in nagios
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in nagios
ID: MDVSA-2009:187
Distribution: Mandriva
Plattformen: Mandriva Corporate 4.0, Mandriva Enterprise Server 5.0
Datum: Sa, 1. August 2009, 04:42
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2288
Applikationen: Nagios

Originalnachricht

This is a multi-part message in MIME format...

------------=_1249094549-13155-560


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2009:187
http://www.mandriva.com/security/
_______________________________________________________________________

Package : nagios
Date : August 1, 2009
Affected: Corporate 4.0, Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

A vulnerability has been found and corrected in nagios:

statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute
arbitrary commands via shell metacharacters in the (1) ping or (2)
Traceroute parameters (CVE-2009-2288).

This update provides nagios 3.1.2, which is not vulnerable to this
issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2288
_______________________________________________________________________

Updated Packages:

Corporate 4.0:
7472e8523c46ca410cefd9409a179268
corporate/4.0/i586/nagios-3.1.2-0.1.20060mlcs4.i586.rpm
89a90ebea94c9b6be5b96b29b057e941
corporate/4.0/i586/nagios-devel-3.1.2-0.1.20060mlcs4.i586.rpm
ed9c5a112b2da874d94d77d9e487295f
corporate/4.0/i586/nagios-theme-default-3.1.2-0.1.20060mlcs4.i586.rpm
1b5be207136af2bea3c57a6cae095d1f
corporate/4.0/i586/nagios-www-3.1.2-0.1.20060mlcs4.i586.rpm
8727421dc7496303fbd8f61d2ad9ad7b
corporate/4.0/SRPMS/nagios-3.1.2-0.1.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
0327db2ac9b511fa72c4a4ac7349ee0a
corporate/4.0/x86_64/nagios-3.1.2-0.1.20060mlcs4.x86_64.rpm
7a36ca1cb34667d84d78f9b0b48f2976
corporate/4.0/x86_64/nagios-devel-3.1.2-0.1.20060mlcs4.x86_64.rpm
a81e17fc9f68d97674c252f0266d6502
corporate/4.0/x86_64/nagios-theme-default-3.1.2-0.1.20060mlcs4.x86_64.rpm
6b4da1474cc9b4931fa8dcbe7f9b75ef
corporate/4.0/x86_64/nagios-www-3.1.2-0.1.20060mlcs4.x86_64.rpm
8727421dc7496303fbd8f61d2ad9ad7b
corporate/4.0/SRPMS/nagios-3.1.2-0.1.20060mlcs4.src.rpm

Mandriva Enterprise Server 5:
248bc01aab687002a8358916e7b3fc82 mes5/i586/nagios-3.1.2-0.2mdvmes5.i586.rpm
44aeb0da66acda1d01549f56a190800f
mes5/i586/nagios-devel-3.1.2-0.2mdvmes5.i586.rpm
305cefdd9a47d7ce8ab6a4fd388f02d6
mes5/i586/nagios-theme-default-3.1.2-0.2mdvmes5.i586.rpm
3333d2362e45a46a0eccbeed8719435e
mes5/i586/nagios-www-3.1.2-0.2mdvmes5.i586.rpm
e66cb2c237aed7e1e96251054a191413 mes5/SRPMS/nagios-3.1.2-0.2mdvmes5.src.rpm

Mandriva Enterprise Server 5/X86_64:
6c37a65ce53a4795fe78747d2aa3b25c
mes5/x86_64/nagios-3.1.2-0.2mdvmes5.x86_64.rpm
b58de355fcb5f7fac50dc251c3ebbd54
mes5/x86_64/nagios-devel-3.1.2-0.2mdvmes5.x86_64.rpm
5dd3dca4fbb5530382d8b3aeb4fcf5b0
mes5/x86_64/nagios-theme-default-3.1.2-0.2mdvmes5.x86_64.rpm
3a216297c88bbf869440b3594ec27027
mes5/x86_64/nagios-www-3.1.2-0.2mdvmes5.x86_64.rpm
e66cb2c237aed7e1e96251054a191413 mes5/SRPMS/nagios-3.1.2-0.2mdvmes5.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFKc4A/mqjQ0CJFipgRAoifAJ9WmG+u08se/DyR2TjZ2GX+nRpyLgCgkiKo
DqUpIY99w28fMGbbq0S+quY=
=0LGX
-----END PGP SIGNATURE-----


------------=_1249094549-13155-560
Content-Type: text/plain; name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________

------------=_1249094549-13155-560--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung