First published: Thu Jul 03 2014(Updated: )
Snoopy allows remote attackers to execute arbitrary commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nagios | <0:3.5.1-9.el6 | 0:3.5.1-9.el6 |
redhat/nagios | <0:3.5.1-9.el7 | 0:3.5.1-9.el7 |
Snoopy project Snoopy | ||
Red Hat OpenStack for IBM Power | =5.0 | |
Red Hat OpenStack for IBM Power | =6.0 | |
Debian | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2014-5008 has a high severity rating due to its potential for remote command execution by attackers.
To fix CVE-2014-5008, upgrade the affected Nagios package to version 0:3.5.1-10.el6 or 0:3.5.1-10.el7.
CVE-2014-5008 affects the Nagios software versions 0:3.5.1-9.el6 and 0:3.5.1-9.el7, as well as the Snoopy library.
CVE-2014-5008 allows attackers to execute arbitrary commands through the manipulation of Nagios HTTP headers.
Yes, CVE-2014-5008 is known to be exploitable, allowing remote attackers to execute commands without authorization.