Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 494510 (CVE-2013-7106) - <net-analyzer/icinga-{1.9.4,1.10.2} : multiple vulnerabilities (CVE-2013-{7106,7107,7108})
Summary: <net-analyzer/icinga-{1.9.4,1.10.2} : multiple vulnerabilities (CVE-2013-{710...
Status: RESOLVED FIXED
Alias: CVE-2013-7106
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: http://www.openwall.com/lists/oss-sec...
Whiteboard: ~1 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2013-12-17 08:30 UTC by Agostino Sarubbo
Modified: 2013-12-20 10:22 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-12-17 08:30:51 UTC
From ${URL} :

> Von: cve-assign@...re.org
> Betreff: Aw: Vulnerability (Buffer Overflow) in Icinga 1.8, 1.9 and 1.10 (Icinga Issue #5250) 
Vulnerability (Off-by-one memory access) in Icinga 1.8, 1.9 and 1.10 (Icinga Issue #5251)
> Datum: 15. Dezember 2013 19:29:59 MEZ
> An: ricardo@...chbrothers.com
> Kopie: cve-assign@...re.org
> 
> Signierter PGP Teil
> Here are the three CVE IDs for your recent reports. Because one report
> mentions CSRF, our expectation is that some type of CSRF impact would
> remain even after the buffer overflows were fixed.
> 
> > This is fixed with Icinga (https://dev.icinga.org/issues/5250):
> > 	1.10.2
> > 	1.9.4
> > 	1.8.5
> >
> > The icinga web gui is susceptible to several buffer overflow flaws,
> > which can be triggered as a logged on user.
> >
> > controlling the program flow by modifying the stack content
> 
> Use CVE-2013-7106.
> 
> 
> > A remote attacker may utilize a CSRF (cross site request forgery)
> > attack vector against a logged in user
> 
> Use CVE-2013-7107.
> 
> 
> > This is fixed with Icinga (https://dev.icinga.org/issues/5251):
> > 	1.10.2
> > 	1.9.4
> > 	1.8.5
> >
> > This probably affects Nagios in current version as well!
> >
> > The icinga web gui are susceptible to an "off-by-one read" error ...
> > the check routine can be forced to skip the terminating null pointer
> > and read the heap address right after the end of the parameter list.
> > Depending on the memory layout, this may result in a memory corruption
> > condition/crash or reading of sensitive memory locations.
> 
> Use CVE-2013-7108.


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Matthew Thode ( prometheanfire ) archtester Gentoo Infrastructure gentoo-dev Security 2013-12-18 01:58:47 UTC
removed badness added goodness

fixes are in tree as 1.9.4 and 1.10.2.  Vulnerable ebuilds removed. No need to stablize.
Comment 2 Chris Reffett (RETIRED) gentoo-dev Security 2013-12-18 02:02:48 UTC
Okay then. Closing noglsa, since this is ~ only.
Comment 3 Agostino Sarubbo gentoo-dev 2013-12-20 10:22:44 UTC
@ Chris: before close the bugs please fix the summary