CVE-2013-7205
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
15/01/2014
Last modified:
11/04/2025
Description
Off-by-one error in the process_cgivars function in contrib/daemonchk.c in Nagios Core 3.5.1, 4.0.2, and earlier allows remote authenticated users to obtain sensitive information from process memory or cause a denial of service (crash) via a long string in the last key value in the variable list, which triggers a heap-based buffer over-read.
Impact
Base Score 2.0
6.40
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:* | 4.0.2 (including) | |
cpe:2.3:a:nagios:nagios:3.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:nagios:nagios:3.0:alpha1:*:*:*:*:*:* | ||
cpe:2.3:a:nagios:nagios:3.0:alpha2:*:*:*:*:*:* | ||
cpe:2.3:a:nagios:nagios:3.0:alpha3:*:*:*:*:*:* | ||
cpe:2.3:a:nagios:nagios:3.0:alpha4:*:*:*:*:*:* | ||
cpe:2.3:a:nagios:nagios:3.0:alpha5:*:*:*:*:*:* | ||
cpe:2.3:a:nagios:nagios:3.0:beta1:*:*:*:*:*:* | ||
cpe:2.3:a:nagios:nagios:3.0:beta2:*:*:*:*:*:* | ||
cpe:2.3:a:nagios:nagios:3.0:beta3:*:*:*:*:*:* | ||
cpe:2.3:a:nagios:nagios:3.0:beta4:*:*:*:*:*:* | ||
cpe:2.3:a:nagios:nagios:3.0:beta5:*:*:*:*:*:* | ||
cpe:2.3:a:nagios:nagios:3.0:beta6:*:*:*:*:*:* | ||
cpe:2.3:a:nagios:nagios:3.0:beta7:*:*:*:*:*:* | ||
cpe:2.3:a:nagios:nagios:3.0:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/55976
- http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/
- http://www.mandriva.com/security/advisories?name=MDVSA-2014%3A004
- http://www.openwall.com/lists/oss-security/2013/12/24/1
- http://www.securityfocus.com/bid/64489
- https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html
- http://secunia.com/advisories/55976
- http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/
- http://www.mandriva.com/security/advisories?name=MDVSA-2014%3A004
- http://www.openwall.com/lists/oss-security/2013/12/24/1
- http://www.securityfocus.com/bid/64489
- https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html