First published: Wed Jul 01 2009(Updated: )
statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nagios | =3.0-alpha3 | |
Nagios | =2.7 | |
Nagios | =3.0-rc3 | |
Nagios | =3.0-beta4 | |
Nagios | =3.0.6 | |
Nagios | =1.1 | |
Nagios | =3.0-alpha2 | |
Nagios | =3.0.1 | |
Nagios | =1.0 | |
Nagios | =3.0-beta5 | |
Nagios | =3.0-rc1 | |
Nagios | <=3.1.0 | |
Nagios | =1.0b4 | |
Nagios | =3.0.2 | |
Nagios | =2.0b4 | |
Nagios | =3.0-beta2 | |
Nagios | =2.10 | |
Nagios | =3.0-beta7 | |
Nagios | =3.0-rc2 | |
Nagios | =3.0 | |
Nagios | =2.0 | |
Nagios | =3.0.4 | |
Nagios | =3.0-alpha1 | |
Nagios | =1.4.1 | |
Nagios | =3.0-beta6 | |
Nagios | =3.0-alpha4 | |
Nagios | =3.0-beta1 | |
Nagios | =1.0b1 | |
Nagios | =3.0-beta3 | |
Nagios | =3.0.3 | |
Nagios | =1.0b2 | |
Nagios | =3.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-2288 has a moderate severity rating, as it allows remote attackers to execute arbitrary commands.
To fix CVE-2009-2288, upgrade to Nagios version 3.1.1 or later, which resolves this vulnerability.
CVE-2009-2288 affects Nagios versions 1.0, 1.1, 2.0, 2.7, and all 3.0 versions up to 3.1.0.
CVE-2009-2288 affects the statuswml.cgi component in Nagios.
Yes, CVE-2009-2288 can be exploited remotely through crafted input in the ping or Traceroute parameters.