Rapid7 Vulnerability & Exploit Database

RHSA-2009:1141: nagios security update

Back to Search

RHSA-2009:1141: nagios security update

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
07/01/2009
Created
07/25/2018
Added
09/12/2009
Modified
07/04/2017

Description

Updated nagios packages that fix one security issue are now available for the Red Hat HPC Solution. This update has been rated as having important security impact by the Red Hat Security Response Team.

Nagios is a program that can monitor hosts and services on your network. It can send email or page alerts when problems arise and when problems are resolved. A shell command injection flaw was discovered in the statuswml.cgi CGI script used by Nagios. A remote attacker able to access Nagios web pages could use this flaw to run arbitrary commands with the privileges of the web server user (apache). (CVE-2009-2288) Note: Successful authentication is required to access Nagios web pages. In the Red Hat HPC Solution, configuration for Nagios is provided by the kusu-nagios-config package, which creates a user with a fixed, default password during installation. It is recommended to change this default password, or restrict access to Nagios web pages based on a client's IP address as is appropriate for your environment. Users of nagios should upgrade to these updated packages, which contain a backported patch to correct this issue.

Solution(s)

  • redhat-upgrade-nagios
  • redhat-upgrade-nagios-devel

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;