lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1MX4Vs-0003s4-J3@titan.mandriva.com>
Date: Sat, 01 Aug 2009 04:40:00 +0200
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2009:187 ] nagios


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2009:187
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : nagios
 Date    : August 1, 2009
 Affected: Corporate 4.0, Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 A vulnerability has been found and corrected in nagios:
 
 statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute
 arbitrary commands via shell metacharacters in the (1) ping or (2)
 Traceroute parameters (CVE-2009-2288).
 
 This update provides nagios 3.1.2, which is not vulnerable to this
 issue.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2288
 _______________________________________________________________________

 Updated Packages:

 Corporate 4.0:
 7472e8523c46ca410cefd9409a179268  corporate/4.0/i586/nagios-3.1.2-0.1.20060mlcs4.i586.rpm
 89a90ebea94c9b6be5b96b29b057e941  corporate/4.0/i586/nagios-devel-3.1.2-0.1.20060mlcs4.i586.rpm
 ed9c5a112b2da874d94d77d9e487295f  corporate/4.0/i586/nagios-theme-default-3.1.2-0.1.20060mlcs4.i586.rpm
 1b5be207136af2bea3c57a6cae095d1f  corporate/4.0/i586/nagios-www-3.1.2-0.1.20060mlcs4.i586.rpm 
 8727421dc7496303fbd8f61d2ad9ad7b  corporate/4.0/SRPMS/nagios-3.1.2-0.1.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 0327db2ac9b511fa72c4a4ac7349ee0a  corporate/4.0/x86_64/nagios-3.1.2-0.1.20060mlcs4.x86_64.rpm
 7a36ca1cb34667d84d78f9b0b48f2976  corporate/4.0/x86_64/nagios-devel-3.1.2-0.1.20060mlcs4.x86_64.rpm
 a81e17fc9f68d97674c252f0266d6502  corporate/4.0/x86_64/nagios-theme-default-3.1.2-0.1.20060mlcs4.x86_64.rpm
 6b4da1474cc9b4931fa8dcbe7f9b75ef  corporate/4.0/x86_64/nagios-www-3.1.2-0.1.20060mlcs4.x86_64.rpm 
 8727421dc7496303fbd8f61d2ad9ad7b  corporate/4.0/SRPMS/nagios-3.1.2-0.1.20060mlcs4.src.rpm

 Mandriva Enterprise Server 5:
 248bc01aab687002a8358916e7b3fc82  mes5/i586/nagios-3.1.2-0.2mdvmes5.i586.rpm
 44aeb0da66acda1d01549f56a190800f  mes5/i586/nagios-devel-3.1.2-0.2mdvmes5.i586.rpm
 305cefdd9a47d7ce8ab6a4fd388f02d6  mes5/i586/nagios-theme-default-3.1.2-0.2mdvmes5.i586.rpm
 3333d2362e45a46a0eccbeed8719435e  mes5/i586/nagios-www-3.1.2-0.2mdvmes5.i586.rpm 
 e66cb2c237aed7e1e96251054a191413  mes5/SRPMS/nagios-3.1.2-0.2mdvmes5.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 6c37a65ce53a4795fe78747d2aa3b25c  mes5/x86_64/nagios-3.1.2-0.2mdvmes5.x86_64.rpm
 b58de355fcb5f7fac50dc251c3ebbd54  mes5/x86_64/nagios-devel-3.1.2-0.2mdvmes5.x86_64.rpm
 5dd3dca4fbb5530382d8b3aeb4fcf5b0  mes5/x86_64/nagios-theme-default-3.1.2-0.2mdvmes5.x86_64.rpm
 3a216297c88bbf869440b3594ec27027  mes5/x86_64/nagios-www-3.1.2-0.2mdvmes5.x86_64.rpm 
 e66cb2c237aed7e1e96251054a191413  mes5/SRPMS/nagios-3.1.2-0.2mdvmes5.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFKc4A/mqjQ0CJFipgRAoifAJ9WmG+u08se/DyR2TjZ2GX+nRpyLgCgkiKo
DqUpIY99w28fMGbbq0S+quY=
=0LGX
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ