CVE-2007-5198
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
04/10/2007
Last modified:
09/04/2025
Description
Buffer overflow in the redir function in check_http.c in Nagios Plugins before 1.4.10, when running with the -f (follow) option, allows remote web servers to execute arbitrary code via Location header responses (redirects) with a large number of leading "L" characters.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:nagios:plugins:*:*:*:*:*:*:*:* | 1.4.9 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.gentoo.org/show_bug.cgi?id=194178
- http://secunia.com/advisories/27124
- http://secunia.com/advisories/27362
- http://secunia.com/advisories/27609
- http://secunia.com/advisories/27965
- http://secunia.com/advisories/28930
- http://secunia.com/advisories/29862
- http://security.gentoo.org/glsa/glsa-200711-11.xml
- http://sourceforge.net/forum/forum.php?forum_id=740172
- http://sourceforge.net/tracker/index.php?func=detail&aid=1687867&group_id=29880&atid=397597
- http://sourceforge.net/tracker/index.php?func=detail&aid=1813346&group_id=29880&atid=397597
- http://www.debian.org/security/2008/dsa-1495
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A067
- http://www.novell.com/linux/security/advisories/2007_25_sr.html
- http://www.securityfocus.com/bid/25952
- http://www.ubuntu.com/usn/usn-532-1
- http://www.vupen.com/english/advisories/2007/3394
- https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00249.html
- https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00282.html
- https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00320.html
- http://bugs.gentoo.org/show_bug.cgi?id=194178
- http://secunia.com/advisories/27124
- http://secunia.com/advisories/27362
- http://secunia.com/advisories/27609
- http://secunia.com/advisories/27965
- http://secunia.com/advisories/28930
- http://secunia.com/advisories/29862
- http://security.gentoo.org/glsa/glsa-200711-11.xml
- http://sourceforge.net/forum/forum.php?forum_id=740172
- http://sourceforge.net/tracker/index.php?func=detail&aid=1687867&group_id=29880&atid=397597
- http://sourceforge.net/tracker/index.php?func=detail&aid=1813346&group_id=29880&atid=397597
- http://www.debian.org/security/2008/dsa-1495
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A067
- http://www.novell.com/linux/security/advisories/2007_25_sr.html
- http://www.securityfocus.com/bid/25952
- http://www.ubuntu.com/usn/usn-532-1
- http://www.vupen.com/english/advisories/2007/3394
- https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00249.html
- https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00282.html
- https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00320.html



