Multiple vulnerabilities in Nagios may lead to the execution of arbitrary code.
|Package||net-analyzer/nagios-core on all architectures|
|Affected versions||< 3.0.6-r2|
|Unaffected versions||>= 3.0.6-r2|
Nagios is an open source host, service and network monitoring program.
Multiple vulnerabilities have been reported in Nagios:
A remote authenticated or unauthenticated attacker may exploit these vulnerabilities to execute arbitrary commands or elevate privileges.
There is no known workaround at this time.
All Nagios users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-analyzer/nagios-core-3.0.6-r2"
NOTE: Users of the Nagios 2 branch can update to version 2.12-r1 which contains a patch to fix CVE-2009-2288. However, that branch is not supported upstream or in Gentoo and we are unaware whether the other vulnerabilities affect 2.x installations.