Vulnerability Name:

CVE-2007-5198 (CCN-36995)

Assigned:2007-09-28
Published:2007-09-28
Updated:2011-03-08
Summary:Buffer overflow in the redir function in check_http.c in Nagios Plugins before 1.4.10, when running with the -f (follow) option, allows remote web servers to execute arbitrary code via Location header responses (redirects) with a large number of leading "L" characters.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: CONFIRM
Type: UNKNOWN
http://bugs.gentoo.org/show_bug.cgi?id=194178

Source: MITRE
Type: CNA
CVE-2007-5198

Source: CCN
Type: SA27124
Nagios Plugins Long Location Header Buffer Overflow Vulnerability

Source: SECUNIA
Type: UNKNOWN
27124

Source: SECUNIA
Type: UNKNOWN
27362

Source: SECUNIA
Type: UNKNOWN
27609

Source: SECUNIA
Type: UNKNOWN
27965

Source: SECUNIA
Type: UNKNOWN
28930

Source: SECUNIA
Type: UNKNOWN
29862

Source: GENTOO
Type: UNKNOWN
GLSA-200711-11

Source: CCN
Type: SourceForge.net: Forum, 2007-09-28 18:16
Nagios Plugin Development - Nagios Plugins 1.4.10 released!

Source: CONFIRM
Type: UNKNOWN
http://sourceforge.net/forum/forum.php?forum_id=740172

Source: CCN
Type: SourceForge.net
Nagios Plugin Development

Source: CONFIRM
Type: Exploit
http://sourceforge.net/tracker/index.php?func=detail&aid=1687867&group_id=29880&atid=397597

Source: CONFIRM
Type: UNKNOWN
http://sourceforge.net/tracker/index.php?func=detail&aid=1813346&group_id=29880&atid=397597

Source: DEBIAN
Type: UNKNOWN
DSA-1495

Source: DEBIAN
Type: DSA-1495
nagios-plugins -- buffer overflows

Source: CCN
Type: GLSA-200711-11
Nagios Plugins: Two buffer overflows

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2008:067

Source: SUSE
Type: UNKNOWN
SUSE-SR:2007:025

Source: CCN
Type: OSVDB ID: 41639
Nagios Plugins check_http.c redir Function Location Header Response Overflow

Source: BID
Type: UNKNOWN
25952

Source: CCN
Type: BID-25952
Nagios Plugins Location Header Remote Buffer Overflow Vulnerability

Source: CCN
Type: USN-532-1
nagios-plugins vulnerability

Source: UBUNTU
Type: UNKNOWN
USN-532-1

Source: VUPEN
Type: UNKNOWN
ADV-2007-3394

Source: XF
Type: UNKNOWN
nagios-plugins-redir-bo(36995)

Source: FEDORA
Type: UNKNOWN
FEDORA-2008-3061

Source: FEDORA
Type: UNKNOWN
FEDORA-2008-3098

Source: FEDORA
Type: UNKNOWN
FEDORA-2008-3146

Source: SUSE
Type: SUSE-SR:2007:025
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:nagios:plugins:*:*:*:*:*:*:*:* (Version <= 1.4.9)

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20075198
    V
    CVE-2007-5198
    2015-11-16
    oval:org.mitre.oval:def:17513
    P
    USN-532-1 -- nagios-plugins vulnerability
    2014-06-30
    oval:org.mitre.oval:def:7850
    P
    DSA-1495 nagios-plugins -- buffer overflows
    2014-06-23
    oval:org.mitre.oval:def:18454
    P
    DSA-1495-1 nagios-plugins - several
    2014-06-23
    oval:org.debian:def:1495
    V
    buffer overflows
    2008-02-12
    BACK
    nagios plugins *