CVE-2012-6096
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
22/01/2013
Last modified:
11/04/2025
Description
Multiple stack-based buffer overflows in the get_history function in history.cgi in Nagios Core before 3.4.4, and Icinga 1.6.x before 1.6.2, 1.7.x before 1.7.4, and 1.8.x before 1.8.4, might allow remote attackers to execute arbitrary code via a long (1) host_name variable (host parameter) or (2) svc_description variable.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:* | 3.4.3 (including) | |
cpe:2.3:a:nagios:nagios:3.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:nagios:nagios:3.0:alpha1:*:*:*:*:*:* | ||
cpe:2.3:a:nagios:nagios:3.0:alpha2:*:*:*:*:*:* | ||
cpe:2.3:a:nagios:nagios:3.0:alpha3:*:*:*:*:*:* | ||
cpe:2.3:a:nagios:nagios:3.0:alpha4:*:*:*:*:*:* | ||
cpe:2.3:a:nagios:nagios:3.0:alpha5:*:*:*:*:*:* | ||
cpe:2.3:a:nagios:nagios:3.0:beta1:*:*:*:*:*:* | ||
cpe:2.3:a:nagios:nagios:3.0:beta2:*:*:*:*:*:* | ||
cpe:2.3:a:nagios:nagios:3.0:beta3:*:*:*:*:*:* | ||
cpe:2.3:a:nagios:nagios:3.0:beta4:*:*:*:*:*:* | ||
cpe:2.3:a:nagios:nagios:3.0:beta5:*:*:*:*:*:* | ||
cpe:2.3:a:nagios:nagios:3.0:beta6:*:*:*:*:*:* | ||
cpe:2.3:a:nagios:nagios:3.0:beta7:*:*:*:*:*:* | ||
cpe:2.3:a:nagios:nagios:3.0:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.grok.org.uk/pipermail/full-disclosure/2012-December/089125.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00033.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00060.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00077.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00088.html
- http://secunia.com/advisories/51863
- http://www.debian.org/security/2013/dsa-2616
- http://www.debian.org/security/2013/dsa-2653
- http://www.exploit-db.com/exploits/24084
- http://www.exploit-db.com/exploits/24159
- http://www.nagios.org/projects/nagioscore/history/core-3x
- http://www.osvdb.org/89170
- http://www.securityfocus.com/bid/56879
- https://bugzilla.redhat.com/show_bug.cgi?id=893269
- https://dev.icinga.org/issues/3532
- https://www.icinga.org/2013/01/14/icinga-1-6-2-1-7-4-1-8-4-released/
- http://lists.grok.org.uk/pipermail/full-disclosure/2012-December/089125.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00033.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00060.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00077.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00088.html
- http://secunia.com/advisories/51863
- http://www.debian.org/security/2013/dsa-2616
- http://www.debian.org/security/2013/dsa-2653
- http://www.exploit-db.com/exploits/24084
- http://www.exploit-db.com/exploits/24159
- http://www.nagios.org/projects/nagioscore/history/core-3x
- http://www.osvdb.org/89170
- http://www.securityfocus.com/bid/56879
- https://bugzilla.redhat.com/show_bug.cgi?id=893269
- https://dev.icinga.org/issues/3532
- https://www.icinga.org/2013/01/14/icinga-1-6-2-1-7-4-1-8-4-released/