Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
These remote packages are missing security patches :
The nagios CGI scripts did not sufficiently check the validity of the
HTTP Content-Length attribute. By sending a specially crafted HTTP
request with an invalidly large Content-Length value to the Nagios
server, a remote attacker could exploit this to execute arbitrary code
with web server rights.
Please note that the Apache 2 web server already checks for valid
Content-Length values, so installations using Apache 2 (the only web
server officially supported in Ubuntu) are not vulnerable to this
Upgrade to :
- nagios-common-1.3-cvs.20050402-4ubuntu3.2 (Ubuntu 5.10)
- nagios-mysql-1.3-cvs.20050402-4ubuntu3.2 (Ubuntu 5.10)
- nagios-pgsql-1.3-cvs.20050402-4ubuntu3.2 (Ubuntu 5.10)
- nagios-text-1.3-cvs.20050402-4ubuntu3.2 (Ubuntu 5.10)
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: Ubuntu Security Notice (C) 2005 Canonical, Inc. / NASL script (C) 2005 Michel Arboi
|Apple MacBook A1342 Logic Board 820-2883-A Late 2009 w/ Intel P7550 2.26GHz
|evga 780i sli motherboard with xeon x5460 and 8gb ram
|31TE3MB0040 TOSHIBA MOTHERBOARD L645D-S4037 L645D-S SERIES "GRADE A"
|APPLE MOTHERBOARD POWER MACINTOSH 9500. 820-0563-B
No Discussions have been posted on this vulnerability.