FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

Revision:  373141
Date:      2014-11-23
Time:      10:35:06Z
Committer: madpilot

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
3ebd4cb5-657f-11de-883a-00e0815b8da8nagios -- Command Injection Vulnerability

Secunia reports:

A vulnerability has been reported in Nagios, which can be exploited by malicious users to potentially compromise a vulnerable system.

Input passed to the "ping" parameter in statuswml.cgi is not properly sanitised before being used to invoke the ping command. This can be exploited to inject and execute arbitrary shell commands.

Successful exploitation requires access to the ping feature of the WAP interface.


Discovery 2009-05-29
Entry 2009-06-30
Modified 2009-07-13
nagios
le 3.0.6_1

nagios2
le 2.12_3

nagios-devel
le 3.1.0_1

CVE-2009-2288
http://secunia.com/advisories/35543
http://tracker.nagios.org/view.php?id=15
3ebd4cb5-657f-11de-883a-00e0815b8da8nagios -- Command Injection Vulnerability

Secunia reports:

A vulnerability has been reported in Nagios, which can be exploited by malicious users to potentially compromise a vulnerable system.

Input passed to the "ping" parameter in statuswml.cgi is not properly sanitised before being used to invoke the ping command. This can be exploited to inject and execute arbitrary shell commands.

Successful exploitation requires access to the ping feature of the WAP interface.


Discovery 2009-05-29
Entry 2009-06-30
Modified 2009-07-13
nagios
le 3.0.6_1

nagios2
le 2.12_3

nagios-devel
le 3.1.0_1

CVE-2009-2288
http://secunia.com/advisories/35543
http://tracker.nagios.org/view.php?id=15
97c22a94-5b8b-11e2-b131-000c299b62e1nagios -- buffer overflow in history.cgi

full disclosure reports:

history.cgi is vulnerable to a buffer overflow due to the use of sprintf with user supplied data that has not been restricted in size.


Discovery 2012-12-21
Entry 2013-01-10
nagios
lt 3.4.3_1

CVE-2012-6096
http://archives.neohapsis.com/archives/fulldisclosure/2012-12/0108.html
http://nagios.svn.sourceforge.net/viewvc/nagios?view=revision&revision=2547
97c22a94-5b8b-11e2-b131-000c299b62e1nagios -- buffer overflow in history.cgi

full disclosure reports:

history.cgi is vulnerable to a buffer overflow due to the use of sprintf with user supplied data that has not been restricted in size.


Discovery 2012-12-21
Entry 2013-01-10
nagios
lt 3.4.3_1

CVE-2012-6096
http://archives.neohapsis.com/archives/fulldisclosure/2012-12/0108.html
http://nagios.svn.sourceforge.net/viewvc/nagios?view=revision&revision=2547
ba04a373-7d20-11e3-8992-00132034b086nagios -- denial of service vulnerability

Eric Stanley reports:

Most CGIs previously incremented the input variable counter twice when it encountered a long key value. This could cause the CGI to read past the end of the list of CGI variables.


Discovery 2013-12-20
Entry 2014-01-14
nagios
lt 3.5.1_3

CVE-2013-7108
CVE-2013-7205
http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/
https://bugzilla.redhat.com/show_bug.cgi?id=1046113