Bypass auth checks in Nagios (CVE-2008-5027, CVE-2008-5028)

Bug #301542 reported by Thierry Carrez
254
Affects Status Importance Assigned to Milestone
nagios3 (Ubuntu)
Fix Released
Undecided
Unassigned

Bug Description

Binary package hint: nagios3

CVE 2008-5027
The Nagios process in (1) Nagios before 3.0.5 and (2) op5 Monitor before 4.0.1 allows remote authenticated users to bypass authorization checks, and trigger execution of arbitrary programs by this process, via an (a) custom form or a (b) browser addon.

CVE 2008-5028
Cross-site request forgery (CSRF) vulnerability in cmd.cgi in (1) Nagios 3.0.5 and (2) op5 Monitor before 4.0.1 allows remote attackers to send commands to the Nagios process, and trigger execution of arbitrary programs by this process, via unspecified HTTP requests.

Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package nagios3 - 3.0.6-1ubuntu1

---------------
nagios3 (3.0.6-1ubuntu1) jaunty; urgency=low

  * Merge from debian unstable, remaining changes:
    + debian/nagios3-common.prerm:
      - Purge fails if /etc/nagios3/apache2.conf is missing.
    + Update maintainer according to spec.
  * Closes LP: #301542
  * Merge done by Bhavani Shankar, thanks (LP: #308434)

nagios3 (3.0.6-1) unstable; urgency=high

  * New upstream version
    - Even more fixes for CVE-2008-5028
  * Urgency high for security fixes
  * Add ${shlibs:Depends} (Fixes lintian error, as the epn debugger
    should depend on libc)
  * Add ${misc:Depends} to binaries (Fixes lintian warning)

nagios3 (3.0.5-1) unstable; urgency=low

  [ Christian Perrier ]
  * Fix pending l10n issues. Debconf translations:
    - Italian. Closes: #505813
    - Polish. Closes: #506851

  [ Alexander Wirt ]
  * New upstream version
    - Adds security fix for cmd.cgi (Closes: #504894)
      This security problem is referenced as CVE-2008-5028 and SA32610

 -- Chuck Short <email address hidden> Mon, 08 Dec 2008 10:51:56 +0000

Changed in nagios3:
status: New → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.