hey security team and nagios team,

as reported to us in the bts, the debian nagios packages are vulnerable
to arbitrary code execution via not properly checking the Content-Length
header from client requests.

here are the affected versions afaict:

stable: 

nagios-mysql 2:1.3-cvs.20050402-2.sarge.1
nagios-text 2:1.3-cvs.20050402-2.sarge.1
nagios-pgsql 2:1.3-cvs.20050402-2.sarge.1

unstable:

nagios-mysql 2:1.3-cvs.20050402-13
nagios-text 2:1.3-cvs.20050402-13
nagios-pgsql 2:1.3-cvs.20050402-13
nagios2 2.2-1

in unstable both the 1.x and 2.x trees have had updates from upstream.
i've just finished putting the changes into svn, but i haven't prepared
an upload yet because i haven't been able to find/craft an exploit
just yet, and i'm in one of those "low on time" modes where it's
possible i may have messed something up.

so, i could use help with the following two things:

- crafting a simple "user-agent" that can illustrate the vulnerability
  by sending a negative or 0 value for content length to a nagios cgi
  (it doesn't have to actually inject any shell code or anything, just
  PoC would be fine by me).
- verifying that the latest branches in svn are fixed.

if anyone could assist me with either of these, it'd be much
appreciated. 


        sean

-- 

Attachment: signature.asc
Description: Digital signature

Reply via email to