Nagios is vulnerable to a buffer overflow which may lead to remote execution of arbitrary code.
|Package||net-analyzer/nagios-core on all architectures|
|Affected versions||< 1.4.1|
|Unaffected versions||>= 1.4.1|
Nagios is an open source host, service and network monitoring program.
Sebastian Krahmer of the SuSE security team discovered a buffer overflow vulnerability in the handling of a negative HTTP Content-Length header.
A buffer overflow in Nagios CGI scripts under certain web servers allows remote attackers to execute arbitrary code via a negative content length HTTP header.
There is no known workaround at this time.
All Nagios users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-analyzer/nagios-core-1.4.1"