Nagios history.cgi "get_history()" Buffer Overflow Vulnerability


Description   temp66 has reported a vulnerability in Nagios, which can be exploited by malicious people to compromise a vulnerable system.
The vulnerability is caused due to a boundary error within the "get_history()" function (history.c) within history.cgi when handling certain parameters, which can be exploited to cause a stack-based buffer overflow via an overly long "host" parameter.
Successful exploitation may allow execution of arbitrary code.
The vulnerability is reported in version 3.4.3. Prior versions may also be affected.
     
Vulnerable Products   Vulnerable Software:
Nagios 3.x
     
Solution   Update to version 3.4.4.
     
CVE   CVE-2012-6096
     
References   Nagios:
http://www.nagios.org/projects/nagioscore/history/core-3x
temp66:
http://archives.neohapsis.com/archives/fulldisclosure/2012-12/0108.html
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
Possible buffer overflow on URL
3.2.0
     


 
 
 
 
 Risk level 
High 

 Vulnerability First Public Report Date 
2012-12-19 

 Target Type 
Server 

 Possible exploit 
Remote