Source: nagios4
Version: 4.3.4-2
Severity: important
Tags: patch security upstream

Hi,

The following vulnerabilities were published for nagios4.

CVE-2018-13441[0]:
| qh_help in Nagios Core version 4.4.1 and earlier is prone to a NULL
| pointer dereference vulnerability, which allows attacker to cause a
| local denial-of-service condition by sending a crafted payload to the
| listening UNIX socket.

CVE-2018-13457[1]:
| qh_echo in Nagios Core 4.4.1 and earlier is prone to a NULL pointer
| dereference vulnerability, which allows attackers to cause a local
| denial-of-service condition by sending a crafted payload to the
| listening UNIX socket.

CVE-2018-13458[2]:
| qh_core in Nagios Core 4.4.1 and earlier is prone to a NULL pointer
| dereference vulnerability, which allows attackers to cause a local
| denial-of-service condition by sending a crafted payload to the
| listening UNIX socket.

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2018-13441
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13441
[1] https://security-tracker.debian.org/tracker/CVE-2018-13457
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13457
[2] https://security-tracker.debian.org/tracker/CVE-2018-13458
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13458
[3] 
https://github.com/NagiosEnterprises/nagioscore/commit/b1a92a3b52d292ccb601e77a0b29cb1e67ac9d76

Regards,
Salvatore

Reply via email to