Your message dated Sat, 09 Mar 2013 09:04:37 +0000
with message-id <e1uefhl-0000mn...@franck.debian.org>
and subject line Bug#701227: fixed in nagios-nrpe 2.13-3
has caused the Debian Bug report #701227,
regarding nagios-nrpe: CVE-2013-1362: allows the passing of $() as command 
arguments to execute shell commands
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
701227: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701227
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: nagios-nrpe
Severity: grave
Tags: security

Hi

On bugtraq mailinglist it was reported publicly[1]. If support for
command argument in the daemon are enabled then it would be possible
to pass $() and possibly executing shell commands when run unter bash.

Upstream has released 2.14 containing a patch and disabling bash
command substitutions by default:

2.14 - 12/21/2012
-----------------
- Added configure option to allow bash command substitutions, disabled by 
default [bug #400] (Eric Stanley)
- Patched to shutdown SSL connection completely (Jari Takkala)
- Added SRC support on AIX (Thierry Bertaud)
- Updated RPM SPEC file to support creating RPMs on AIX (Eric Stanley)
- Updated logging to support compiling on AIX (Eric Stanley)

According to [1], there is CVE-2013-1362 assigned to it.

In the debian package we have explicitly --enable-command-args so the
Debian packages looks affected.
 
 [1]: http://seclists.org/bugtraq/2013/Feb/119

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: nagios-nrpe
Source-Version: 2.13-3

We believe that the bug you reported is fixed in the latest version of
nagios-nrpe, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 701...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Alexander Wirt <formo...@debian.org> (supplier of updated nagios-nrpe package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Sat, 09 Mar 2013 08:42:05 +0100
Source: nagios-nrpe
Binary: nagios-nrpe-server nagios-nrpe-plugin
Architecture: source amd64
Version: 2.13-3
Distribution: unstable
Urgency: high
Maintainer: Debian Nagios Maintainer Group 
<pkg-nagios-de...@lists.alioth.debian.org>
Changed-By: Alexander Wirt <formo...@debian.org>
Description: 
 nagios-nrpe-plugin - Nagios Remote Plugin Executor Plugin
 nagios-nrpe-server - Nagios Remote Plugin Executor Server
Closes: 701227
Changes: 
 nagios-nrpe (2.13-3) unstable; urgency=high
 .
   * [e55afd1] Add 08_CVE-2013-1362.dpatch patch.
     If command arguments are enabled in the NRPE configuration, it was
     possible to pass $() as arguments as the checking for nasty caracters
     was not strict enough to catch $(). This allowed executing shell
     commands under a subprocess and pass the output as a parameter to the
     called script (if run under bash). CVE-2013-1362 (Closes: #701227)
Checksums-Sha1: 
 ce797b74315a839d047b9f14e92ec152c7e1664f 1356 nagios-nrpe_2.13-3.dsc
 8af5274412281f9bc77c819c1cf8838351804c73 11115 nagios-nrpe_2.13-3.diff.gz
 432c0ba3347aa7aa5e948e84310cfd58ef5380c0 41026 
nagios-nrpe-server_2.13-3_amd64.deb
 a07a26e80cb5bd7cd7404d580a3488c487116141 19692 
nagios-nrpe-plugin_2.13-3_amd64.deb
Checksums-Sha256: 
 b7604c377e9042380be01316394696398a0860fc128d04532c313e3ef2d6a92c 1356 
nagios-nrpe_2.13-3.dsc
 b7bfc6b0d0894bf6660b91292adffc50e28724f905b0df1f59ac561a94a14e4f 11115 
nagios-nrpe_2.13-3.diff.gz
 501c8eb1c2d8703f49cb997b9eb585cd301d05b249cd288e7ef4919e01643865 41026 
nagios-nrpe-server_2.13-3_amd64.deb
 6622c8d1bbcb4e7daaedcb9cfd86dd32b69c6a8d046bbf05b34e2b61b1c5fb15 19692 
nagios-nrpe-plugin_2.13-3_amd64.deb
Files: 
 e23df9385fd97d0150e1f7623928c697 1356 net optional nagios-nrpe_2.13-3.dsc
 854eb80d419e8e51d0d7e0b4a14f7be4 11115 net optional nagios-nrpe_2.13-3.diff.gz
 545cc2e0a1716e59711fb32f39b39772 41026 net optional 
nagios-nrpe-server_2.13-3_amd64.deb
 768f4a3b8ebc00780ac8f37362ea963f 19692 net optional 
nagios-nrpe-plugin_2.13-3_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlE66yMACgkQ01u8mbx9AgqSTgCgw5DQjTUnaHd2tfAuAJWP71LV
fVcAoIX4bz0OgymTdVboLfc5s3gOp/Mb
=Rnqy
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to