"-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ------------------------------------------------------------------------
Debian Security Advisory DSA-1883-1 security@debian.org
http://www.debian.org/security/ Giuseppe Iuculano
September 10, 2009 http://www.debian.org/security/faq
- ------------------------------------------------------------------------
Package : nagios2
Vulnerability : missing input sanitising
Problem type : remote
Debian-specific: no
CVE Ids : CVE-2007-5624 CVE-2007-5803 CVE-2008-1360
Debian Bugs : 448371 482445 485439
Several vulnerabilities have been found in nagios2, ahost/service/network
monitoring and management system. The Common Vulnerabilities and
Exposures project identifies the following problems:
Several cross-site scripting issues via several parameters were
discovered in the CGI scripts, allowing attackers to inject arbitrary
HTML code. In order to cover the different attack vectors, these issues
have been assigned CVE-2007-5624, CVE-2007-5803 and CVE-2008-1360.
For the oldstable distribution (etch), these problems have been fixed in
version 2.6-2+etch4.
The stable distribution (lenny) does not include nagios2 and nagios3 is
not affected by these problems.
The testing distribution (squeeze) and the unstable distribution (sid)
do not contain nagios2 and nagios3 is not affected by these problems.
We recommend that you upgrade your nagios2 packages.
Upgrade instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 4.0 alias etch
- -------------------------------
Debian (oldstable)
- ------------------
Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/n/nagios2/nagios2_2.6-2+etch4.diff.gz
Size/MD5 checksum: 35589 5aee898df4f6ea4a0fa4a1fb22390a0b
http://security.debian.org/pool/updates/main/n/nagios2/nagios2_2.6.orig.tar.gz
Size/MD5 checksum: 1734400 a032edba07bf389b803ce817e9406c02
http://security.debian.org/pool/updates/main/n/nagios2/nagios2_2.6-2+etch4.dsc
Size/MD5 checksum: 948 a4bd33d2bd5c812b5c9899fc41651e37
Architecture independent packages:
http://security.debian.org/pool/updates/main/n/nagios2/nagios2-doc_2.6-2+etch4_all.deb
Size/MD5 checksum: 1149816 8b2d0a07cd650edc3e6d33f74b480cb2
http://security.debian.org/pool/updates/main/n/nagios2/nagios2-common_2.6-2+etch4_all.deb
Size/MD5 checksum: 59416 f70cd9aa86a0eb1b64a914b40da984cd
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/n/nagios2/nagios2_2.6-2+etch4_alpha.deb
Size/MD5 checksum: 1222136 4dc7d3e1230632930471fb0e0dcbd496
http://security.debian.org/pool/updates/main/n/nagios2/nagios2-dbg_2.6-2+etch4_alpha.deb
Size/MD5 checksum: 1702766 6ff7f9e7bb6cdaa0cea2fb0dfe35ae72
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/n/nagios2/nagios2-dbg_2.6-2+etch4_amd64.deb
Size/MD5 checksum: 1687984 4c28fa0a9fa9883cdff1e038c56924e0
http://security.debian.org/pool/updates/main/n/nagios2/nagios2_2.6-2+etch4_amd64.deb
Size/MD5 checksum: 1097788 31afdb67e26e5f1a56a9da11117a1452
arm architecture (ARM)
http://security.debian.org/pool/updates/main/n/nagios2/nagios2-dbg_2.6-2+etch4_arm.deb
Size/MD5 checksum: 1537452 4e4d636a0699cf9f714a522885894a4e
http://security.debian.org/pool/updates/main/n/nagios2/nagios2_2.6-2+etch4_arm.deb
Size/MD5 checksum: 1023982 fb3a8f2b2b592bafcf1830172a7d5a8e
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/n/nagios2/nagios2_2.6-2+etch4_hppa.deb
Size/MD5 checksum: 1148976 c875e0ab58ca0f39bf34b1704cc4a969
http://security.debian.org/pool/updates/main/n/nagios2/nagios2-dbg_2.6-2+etch4_hppa.deb
Size/MD5 checksum: 1622072 e002a9c7703542bd8aa8e509238ba29c
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/n/nagios2/nagios2-dbg_2.6-2+etch4_i386.deb
Size/MD5 checksum: 1587836 778bd65bfb6cfb1f3f0efcb872a32360
http://security.debian.org/pool/updates/main/n/nagios2/nagios2_2.6-2+etch4_i386.deb
Size/MD5 checksum: 1016950 720d00ef27782b51c0b7e675c2f82309
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/n/nagios2/nagios2_2.6-2+etch4_ia64.deb
Size/MD5 checksum: 1623324 1a157461c15e81c93670ad92c3792b69
http://security.debian.org/pool/updates/main/n/nagios2/nagios2-dbg_2.6-2+etch4_ia64.deb
Size/MD5 checksum: 1711252 762d02684f9db0f34c92bd7d7b6ebbcf
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/n/nagios2/nagios2_2.6-2+etch4_mips.deb
Size/MD5 checksum: 1105228 bdc34a55e69e12061ee6ea274f111c78
http://security.debian.org/pool/updates/main/n/nagios2/nagios2-dbg_2.6-2+etch4_mips.deb
Size/MD5 checksum: 1710346 4cbc8945fe0fbcaa241a9abe3790205c
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/n/nagios2/nagios2-dbg_2.6-2+etch4_mipsel.deb
Size/MD5 checksum: 1663580 46330520785afa00addcf8f97dbef312
http://security.debian.org/pool/updates/main/n/nagios2/nagios2_2.6-2+etch4_mipsel.deb
Size/MD5 checksum: 1104930 b5a2ee4c401e8e498ae0d4e087e2be8e
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/n/nagios2/nagios2_2.6-2+etch4_powerpc.deb
Size/MD5 checksum: 1088364 ffa92a52851e793f11a63b4e56767e9e
http://security.debian.org/pool/updates/main/n/nagios2/nagios2-dbg_2.6-2+etch4_powerpc.deb
Size/MD5 checksum: 1667356 9418e0cf94e1499f46728c5376402b90
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/n/nagios2/nagios2_2.6-2+etch4_sparc.deb
Size/MD5 checksum: 988232 9aec288a67ae036df5da714ea72ee19f
http://security.debian.org/pool/updates/main/n/nagios2/nagios2-dbg_2.6-2+etch4_sparc.deb
Size/MD5 checksum: 1484954 8b8e2ee9598191fd5f30132e8d87ebe1
These files will probably be moved into the stable distribution on
its next update.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAkqoeWMACgkQ62zWxYk/rQcqJgCePF6cf7Q3yXmYxxtO1KUNrA5x
nGIAoLAKEdl7kuR7HIa42dIm2QqBiV3X
=5FKp
-----END PGP SIGNATURE-----
"
Rihanna saved millions on new homeDSA 1878-1: New devscripts packages fix remote code execution
This entry was posted
on 12:18 PM
.
Archives
-
▼
2009
(488)
-
▼
September
(53)
- RHSA-2009:1465-01 Important: kvm security and bug ...
- RHSA-2009:1466-01 Important: kernel security and b...
- DSA 1897-1: New horde3 packages fix arbitrary code...
- DSA 1895-1: New xmltooling packages fix potential ...
- DSA 1894-1: New newt packages fix arbitrary code e...
- DSA 1892-1: New dovecot packages fix arbitrary cod...
- GLSA 200909-20 cURL: Certificate validation error
- RHSA-2009:1461-01 Important: Red Hat Application S...
- RHSA-2009:1463-01 Moderate: newt security update
- USN-837-1: Newt vulnerability
- RHSA-2009:1452-01 Moderate: neon security update
- DSA 1891-1: New changetrack packages fix arbitrary...
- USN-836-1: WebKit vulnerabilities
- RHSA-2009:1459-04 Important: cyrus-imapd security ...
- RHSA-2009:1453-01 Moderate: pidgin security update
- USN-835-1: neon vulnerabilities
- DSA 1888-1: New openssl packages deprecate MD2 has...
- USN-834-1: PostgreSQL vulnerabilities
- GLSA 200909-19 Dnsmasq: Multiple vulnerabilities
- GLSA 200909-18 nginx: Remote execution of arbitra...
- DSA 1889-1: New icu packages correct multibyte seq...
- USN-830-1: OpenSSL vulnerability
- RHSA-2009:1438-01 Important: kernel security and b...
- USN-832-1: FreeRADIUS vulnerability
- DSA 1884-1: New nginx packages fix arbitrary code ...
- RHSA-2009:1451-01 Moderate: freeradius security up...
- DSA 1883-2: New nagios2 packages fix regression
- GLSA 200909-17 ZNC: Directory traversal
- USN-821-1: Firefox and Xulrunner vulnerabilities
- DSA 1887-1: New rails packages fix cross-site scri...
- GLSA 200909-14 Horde: Multiple vulnerabilities
- GLSA 200909-16 Wireshark: Denial of Service
- DSA 1878-2: New devscripts packages fix regressions
- GLSA 200909-12 HTMLDOC: User-assisted execution o...
- GLSA 200909-09 Screenie: Insecure temporary file ...
- DSA 1883-1: New nagios2 packages fix several cross...
- RHSA-2009:1432-01 Critical: seamonkey security update
- RHSA-2009:1431-01 Critical: seamonkey security update
- RHSA-2009:1430-01 Critical: firefox security update
- DSA 1879-1: New silc-client/silc-toolkit packages ...
- GLSA 200909-04 Clam AntiVirus: Multiple vulnerabi...
- DSA 1878-1: New devscripts packages fix remote cod...
- DSA 1881-1: New cyrus-imapd packages fix arbitrary...
- GLSA 200909-01 Linux-PAM: Privilege escalation
- GLSA 200909-02 libvorbis: User-assisted execution...
- RHSA-2009:1339-02 Low: rgmanager security, bug fix...
- RHSA-2009:1289-02 Moderate: mysql security and bug...
- RHSA-2009:1321-02 Low: nfs-utils security and bug ...
- RHSA-2009:1278-02 Low: lftp security and bug fix u...
- RHSA-2009:1341-02 Low: cman security, bug fix, and...
- RHSA-2009:1337-02 Low: gfs2-utils security and bug...
- RHSA-2009:1232-01 Moderate: gnutls security update
- RHSA-2009:1239-02 Important: kernel-rt security an...
-
▼
September
(53)