First published: Thu Jul 03 2014(Updated: )
The _httpsrequest function in Snoopy allows remote attackers to execute arbitrary commands. NOTE: this issue exists dues to an incomplete fix for CVE-2008-4796.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nagios | <0:3.5.1-9.el6 | 0:3.5.1-9.el6 |
redhat/nagios | <0:3.5.1-9.el7 | 0:3.5.1-9.el7 |
Snoopy project Snoopy | ||
redhat openstack | =5.0 | |
redhat openstack | =6.0 | |
Nagios | <=4.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2008-7313 is considered a critical vulnerability due to its ability to allow remote attackers to execute arbitrary commands.
To fix CVE-2008-7313, upgrade the affected software packages, such as Nagios, to a version that includes the security patch for this vulnerability.
CVE-2008-7313 affects specific versions of Nagios, particularly 0:3.5.1-9.el6 and 0:3.5.1-9.el7, as well as some versions of the Snoopy library.
CVE-2008-7313 impacts Nagios versions up to 4.2.3 and various versions of the Snoopy library.
Yes, CVE-2008-7313 can be exploited by remote attackers to execute arbitrary commands, highlighting its severity.