CVE-2013-7106
Published Jan 15, 2014
Last updated 11 years ago
Overview
- Description
- Multiple stack-based buffer overflows in Icinga before 1.8.5, 1.9 before 1.9.4, and 1.10 before 1.10.2 allow remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a long string to the (1) display_nav_table, (2) page_limit_selector, (3) print_export_link, or (4) page_num_selector function in cgi/cgiutils.c; (5) status_page_num_selector function in cgi/status.c; or (6) display_command_expansion function in cgi/config.c. NOTE: this can be exploited without authentication by leveraging CVE-2013-7107.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.5
- Impact score
- 6.4
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-119
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3BD88897-2A40-4127-B8B6-A4DEAF4BE166", "versionEndIncluding": "1.8.4" }, { "criteria": "cpe:2.3:a:icinga:icinga:0.8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D65D942-0560-42B0-BAF8-D6B8C4237558" }, { "criteria": "cpe:2.3:a:icinga:icinga:0.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0CF3E50F-0DF1-44C1-9E7D-E3AE9BBAC5C9" }, { "criteria": "cpe:2.3:a:icinga:icinga:0.8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F87DFD18-B038-4E18-889A-FCADDC7E9C23" }, { "criteria": "cpe:2.3:a:icinga:icinga:0.8.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B9B482D1-BB5D-41CC-A330-214F1EC9BD43" }, { "criteria": "cpe:2.3:a:icinga:icinga:0.8.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6EB99BAF-6CF9-4F61-A86B-91F4DAE20F58" }, { "criteria": "cpe:2.3:a:icinga:icinga:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B65BD554-2D66-4237-8829-EC5CFD374E4A" }, { "criteria": "cpe:2.3:a:icinga:icinga:1.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51CBC3F4-EB90-462D-B840-71DB9E8E3667" }, { "criteria": "cpe:2.3:a:icinga:icinga:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "719B37F6-4D3A-4922-B58D-536A775D42D8" }, { "criteria": "cpe:2.3:a:icinga:icinga:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7890303A-21C3-47B8-86AF-1B07A01C9AE6" }, { "criteria": "cpe:2.3:a:icinga:icinga:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CED3BF83-92C3-4324-BC6E-722309A8787B" }, { "criteria": "cpe:2.3:a:icinga:icinga:1.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5F7F451-E7AA-4C84-874D-7C7E5C162DEA" }, { "criteria": "cpe:2.3:a:icinga:icinga:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5250AED-B86C-4415-A274-7DD9659F40D7" }, { "criteria": "cpe:2.3:a:icinga:icinga:1.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6E333C3-C264-41C9-B358-97A3F62C649D" }, { "criteria": "cpe:2.3:a:icinga:icinga:1.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BEAD9B4E-66B1-4E82-8A6F-B46A4F0A61D9" }, { "criteria": "cpe:2.3:a:icinga:icinga:1.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0166CAEF-0126-4B6E-BE57-5398375C17EC" }, { "criteria": "cpe:2.3:a:icinga:icinga:1.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "11406052-8C4C-4CA4-9A73-82135D236741" }, { "criteria": "cpe:2.3:a:icinga:icinga:1.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29CC0581-0AE1-43FE-8F98-CB2E7204A7E7" }, { "criteria": "cpe:2.3:a:icinga:icinga:1.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "246A0425-A4D6-478D-AADB-07A0D3610FED" }, { "criteria": "cpe:2.3:a:icinga:icinga:1.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D7488AD-C2CA-491E-B4E4-322A275EE13A" }, { "criteria": "cpe:2.3:a:icinga:icinga:1.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "01476892-42B5-44F6-91D2-8C9F680A2F02" }, { "criteria": "cpe:2.3:a:icinga:icinga:1.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A830CEA4-06F7-46FB-8216-0D18796F7BF0" }, { "criteria": "cpe:2.3:a:icinga:icinga:1.7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB9B0C24-D65D-4406-B5F7-5EA60F701872" }, { "criteria": "cpe:2.3:a:icinga:icinga:1.7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5260A6FA-C393-4AD5-B5C8-73616F21FEA7" }, { "criteria": "cpe:2.3:a:icinga:icinga:1.7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "94C19BC7-55B5-4D0D-96CC-1C9C40F7829F" }, { "criteria": "cpe:2.3:a:icinga:icinga:1.8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C1DE372-E2A4-4C4B-B85C-104D84696090" }, { "criteria": "cpe:2.3:a:icinga:icinga:1.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2B3410C-6FF8-4485-AC06-BBA15A4BC9E5" }, { "criteria": "cpe:2.3:a:icinga:icinga:1.8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27F6ACDE-05A0-4688-97FF-EB4C23E8F52D" }, { "criteria": "cpe:2.3:a:icinga:icinga:1.8.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6333E91A-6315-437C-A600-0B824976FBB8" }, { "criteria": "cpe:2.3:a:icinga:icinga:1.9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8BCA88C-5AA9-4C0D-9FA3-80BA8FBBD521" }, { "criteria": "cpe:2.3:a:icinga:icinga:1.9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "821C9240-E41E-4BCC-910E-63304F8E3790" }, { "criteria": "cpe:2.3:a:icinga:icinga:1.9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ADFD2677-6BF6-4985-B915-A9395B4A620E" }, { "criteria": "cpe:2.3:a:icinga:icinga:1.9.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FCF96645-E8B6-443A-8761-6F879042F689" }, { "criteria": "cpe:2.3:a:icinga:icinga:1.10.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21460019-53D0-440D-A0A6-4B778B478B4E" }, { "criteria": "cpe:2.3:a:icinga:icinga:1.10.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "30895AD2-198A-4329-9987-347AABDD7C10" } ], "operator": "OR" } ] } ]