Rapid7 Vulnerability & Exploit Database

Amazon Linux AMI: Security patch for nrpe (ALAS-2014-364) (CVE-2014-2913)

Back to Search

Amazon Linux AMI: Security patch for nrpe (ALAS-2014-364) (CVE-2014-2913)

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
05/07/2014
Created
07/25/2018
Added
09/26/2014
Modified
07/04/2017

Description

** DISPUTED ** Incomplete blacklist vulnerability in nrpe.c in Nagios Remote Plugin Executor (NRPE) 2.15 and earlier allows remote attackers to execute arbitrary commands via a newline character in the -a option to libexec/check_nrpe. NOTE: this issue is disputed by multiple parties. It has been reported that the vendor allows newlines as "expected behavior." Also, this issue can only occur when the administrator enables the "dont_blame_nrpe" option in nrpe.conf despite the "HIGH security risk" warning within the comments.

Solution(s)

  • amazon-linux-upgrade-nagios-plugins-nrpe
  • amazon-linux-upgrade-nrpe
  • amazon-linux-upgrade-nrpe-debuginfo

References

  • amazon-linux-upgrade-nagios-plugins-nrpe
  • amazon-linux-upgrade-nrpe
  • amazon-linux-upgrade-nrpe-debuginfo

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;