SynopsisThe remote Debian host is missing a security update.
DescriptionMarkus Krell discovered that Xymon (formerly known as Hobbit), a network- and applications-monitoring system, was vulnerable to the following security issues :
The incorrect handling of user-supplied input in the 'config' command can trigger a stack-based buffer overflow, resulting in denial of service (via application crash) or remote code execution.
The incorrect handling of user-supplied input in the 'config' command can lead to an information leak by serving sensitive configuration files to a remote user.
The commands handling password management do not properly validate user-supplied input, and are thus vulnerable to shell command injection by a remote user.
Incorrect escaping of user-supplied input in status webpages can be used to trigger reflected cross-site scripting attacks.
For Debian 7 'Wheezy', these problems have been fixed in version 4.3.0~beta2.dfsg-9.1+deb7u1.
We recommend that you upgrade your xymon packages.
NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
SolutionUpgrade the affected xymon, and xymon-client packages.