openSUSE Security Update : icinga (openSUSE-SU-2013:0169-1)

high Nessus Plugin ID 75020

Synopsis

The remote openSUSE host is missing a security update.

Description

- imported upstream version 1.7.4 - bnc#797237

- core: add fix for CVE-2012-6096 - history.cgi remote command execution (Eric Stanley, Markus Frosch) #3532 - MF

- core: fix embedded perl segfault #3027 - MF

- core: fix duplicated events on check scheduling logic for new events (Andreas Ericsson) #2676 #2993 - MF

- core: avoid duplicate events when scheduling forced host|service check (Imri Zvik) #2993 - MF

- core: get rid of the instame macro usage while logging alerts and states (Andreas Ericsson) #2665 - MF

- core: revamp the detection of embedded perl usage directive '# icinga: +epn' (Andreas Ericsson) #2197 - MF

- core: fix whitespaces are not stripped using multiple templates ('use abc, def, ghi') #2701 - MF

- core: add hint on icinga.cfg package location, and tip to read Changelog CHANGES on upgrades #2879 - MF

- core: bail out early with config error if resource.cfg macros contain NULL values #2879 - MF

- core: fix logical bug on icinga.cfg detection on config read #2879 - MF

- core: fsync() files before fclose() (Andreas Ericsson) #2948 - MF

- core: remove weird switch() statement when scanning checkresult queue (Andreas Ericsson) #2950 - MF

- core: fix deleting too old check result files (Andreas Ericsson) #2951 - MF

- idoutils: fix IDOUtils on PostgreSQL, recreates service objects in icinga_objects (thx Torsten Fohrer) #3166 - MF

- idoutils: fix icinga mysql db creation script grants access to all dbs #2917 - MF

- idoutils: fix ignoring mysql password in create_mysqldb.sh #2994 - MF

- removed obsolete patches

Solution

Update the affected icinga packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=797237

https://lists.opensuse.org/opensuse-updates/2013-01/msg00060.html

Plugin Details

Severity: High

ID: 75020

File Name: openSUSE-2013-45.nasl

Version: 1.5

Type: local

Agent: unix

Published: 6/13/2014

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.3

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:icinga, p-cpe:/a:novell:opensuse:icinga-debuginfo, p-cpe:/a:novell:opensuse:icinga-debugsource, p-cpe:/a:novell:opensuse:icinga-devel, p-cpe:/a:novell:opensuse:icinga-idoutils, p-cpe:/a:novell:opensuse:icinga-idoutils-debuginfo, p-cpe:/a:novell:opensuse:icinga-idoutils-mysql, p-cpe:/a:novell:opensuse:icinga-idoutils-oracle, p-cpe:/a:novell:opensuse:icinga-idoutils-pgsql, p-cpe:/a:novell:opensuse:icinga-plugins-downtimes, p-cpe:/a:novell:opensuse:icinga-plugins-eventhandlers, p-cpe:/a:novell:opensuse:icinga-www, p-cpe:/a:novell:opensuse:icinga-www-debuginfo, cpe:/o:novell:opensuse:12.2

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/15/2013

Exploitable With

Core Impact

Metasploit (Nagios3 history.cgi Host Command Execution)

Reference Information

CVE: CVE-2012-6096