First published: Wed May 07 2014(Updated: )
** DISPUTED ** Incomplete blacklist vulnerability in nrpe.c in Nagios Remote Plugin Executor (NRPE) 2.15 and earlier allows remote attackers to execute arbitrary commands via a newline character in the -a option to libexec/check_nrpe. NOTE: this issue is disputed by multiple parties. It has been reported that the vendor allows newlines as "expected behavior." Also, this issue can only occur when the administrator enables the "dont_blame_nrpe" option in nrpe.conf despite the "HIGH security risk" warning within the comments.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nagios Remote Plugin Executor | <=2.15 | |
SUSE Linux | =11.4 | |
SUSE Linux | =12.3 | |
SUSE Linux | =13.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2913 is disputed in terms of its severity, but it allows remote attackers to execute arbitrary commands due to incomplete input validation.
To fix CVE-2014-2913, upgrade to a version of Nagios Remote Plugin Executor that is later than 2.15, as older versions are vulnerable.
CVE-2014-2913 affects Nagios Remote Plugin Executor versions up to and including 2.15 and specific versions of openSUSE.
Yes, CVE-2014-2913 allows remote attackers to execute arbitrary commands by exploiting the newline character in the -a option.
While CVE-2014-2913 poses a significant risk due to potential command execution, its criticality has been disputed by various parties.