Vulnerabilities > CVE-2006-2162 - Remote Negative Content-Length Buffer Overflow vulnerability in Nagios 2.0.1/2.1.3

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
low complexity
nagios
nessus

Summary

Buffer overflow in CGI scripts in Nagios 1.x before 1.4 and 2.x before 2.3 allows remote attackers to execute arbitrary code via a negative content length (Content-Length) HTTP header. Upgrade to versions 1.4 and 2.3

Vulnerable Configurations

Part Description Count
Application
Nagios
3

Nessus

  • NASL familySuSE Local Security Checks
    NASL idSUSE9_10984.NASL
    descriptionAn integer overflow exists within the handling of HTTP headers by CGIs. This could lead to arbitrary code execution by remote attackers on behalf of the Nagios CGI scripts. CVE-2006-2162 has been assigned to this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id41089
    published2009-09-24
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/41089
    titleSuSE9 Security Update : nagios-www (YOU Patch Number 10984)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_NAGIOS-WWW-1311.NASL
    descriptionAn Integer-Overflow exists within the handling of HTTP headers by CGIs. This could lead to arbitrary code execution by remote attackers on behalf of the Nagios CGI scripts. CVE-2006-2162 has been assigned to this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id27360
    published2007-10-17
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/27360
    titleopenSUSE 10 Security Update : nagios-www (nagios-www-1311)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-282-1.NASL
    descriptionThe nagios CGI scripts did not sufficiently check the validity of the HTTP Content-Length attribute. By sending a specially crafted HTTP request with a negative Content-Length value to the Nagios server, a remote attacker could exploit this to execute arbitrary code with web server privileges. Please note that the Apache 2 web server already checks for valid Content-Length values, so installations using Apache 2 (the only web server officially supported in Ubuntu) are not vulnerable to this flaw. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id21376
    published2006-05-13
    reporterUbuntu Security Notice (C) 2006-2019 Canonical, Inc. / NASL script (C) 2006-2016 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/21376
    titleUbuntu 5.04 / 5.10 : nagios vulnerability (USN-282-1)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200605-07.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200605-07 (Nagios: Buffer overflow) Sebastian Krahmer of the SuSE security team discovered a buffer overflow vulnerability in the handling of a negative HTTP Content-Length header. Impact : A buffer overflow in Nagios CGI scripts under certain web servers allows remote attackers to execute arbitrary code via a negative content length HTTP header. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id21349
    published2006-05-13
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/21349
    titleGLSA-200605-07 : Nagios: Buffer overflow
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-1072.NASL
    descriptionA buffer overflow has been discovered in nagios, a host, service and network monitoring and management system, that could be exploited by remote attackers to execute arbitrary code.
    last seen2020-06-01
    modified2020-06-02
    plugin id22614
    published2006-10-14
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/22614
    titleDebian DSA-1072-1 : nagios - buffer overflow