CVE-2013-2214

Common Vulnerabilities and Exposures

[Previous] [Index] [Next]

Upstream information

CVE-2013-2214 at MITRE

Description

status.cgi in Nagios 4.0 before 4.0 beta4 and 3.x before 3.5.1 does not properly restrict access to certain users that are a contact for a service, which allows remote authenticated users to obtain sensitive information about hostnames via the servicegroup (1) overview, (2) summary, or (3) grid style in status.cgi. NOTE: this behavior is by design in most 3.x versions, but the upstream vendor "decided to change it for Nagios 4" and 3.5.1.

SUSE information

CVSS v2 Scores
  National Vulnerability Database
Base Score 4.00
Vector AV:N/AC:L/Au:S/C:P/I:N/A:N
Access Vector Network
Access Complexity Low
Authentication Single
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None

This issue is currently rated as having moderate severity.

SUSE Bugzilla entry: 827020 [RESOLVED / WONTFIX]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
openSUSE 12.3
  • nagios >= 3.5.0-2.10.1
  • nagios-debuginfo >= 3.5.0-2.10.1
  • nagios-debugsource >= 3.5.0-2.10.1
  • nagios-devel >= 3.5.0-2.10.1
  • nagios-www >= 3.5.0-2.10.1
  • nagios-www-dch >= 3.5.0-2.10.1
  • nagios-www-debuginfo >= 3.5.0-2.10.1
Patchnames:
openSUSE-2013-563
openSUSE Evergreen 11.4
  • nagios >= 3.2.3-3.26.1
  • nagios-debuginfo >= 3.2.3-3.26.1
  • nagios-debugsource >= 3.2.3-3.26.1
  • nagios-devel >= 3.2.3-3.26.1
  • nagios-www >= 3.2.3-3.26.1
Patchnames:
2013-104


The following information is the current evaluation information for this security issue. It might neither be accurate nor complete, Use at own risk.
Package/Codestreams planned to be updated:
nagios: SLES-10-SP4,SLES_LTSS-10-SP4,SLES_LTSS-11-SP2,sle-sdk-11-SP2,SLES-11-SP2,SLES-for-VMware-11-SP2,SLES-10-SP3,SLES_LTSS-11-SP1,sap-aio-11-SP1,SLES-11-SP1,sle-sdk-11-SP1,SLES-11-SP3,SLES-for-VMware-11-SP3,sle-sdk-11-SP3