First published: Thu Oct 04 2007(Updated: )
Buffer overflow in the redir function in check_http.c in Nagios Plugins before 1.4.10, when running with the -f (follow) option, allows remote web servers to execute arbitrary code via Location header responses (redirects) with a large number of leading "L" characters.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
HP Nagios Plugins | <=1.4.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5198 has a high severity rating due to its potential for arbitrary code execution on affected systems.
To fix CVE-2007-5198, upgrade to Nagios Plugins version 1.4.10 or later, which addresses this vulnerability.
CVE-2007-5198 affects Nagios Plugins versions prior to 1.4.10.
The buffer overflow in CVE-2007-5198 allows remote attackers to execute arbitrary code via malicious Location header responses.
Exploiting CVE-2007-5198 can lead to unauthorized access and control over the affected system.