First published: Thu Jul 03 2014(Updated: )
Snoopy allows remote attackers to execute arbitrary commands. NOTE: this vulnerability exists due to an incomplete fix for CVE-2014-5008.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nagios | <0:3.5.1-9.el6 | 0:3.5.1-9.el6 |
redhat/nagios | <0:3.5.1-9.el7 | 0:3.5.1-9.el7 |
Snoopy project Snoopy | ||
Red Hat OpenStack for IBM Power | =5.0 | |
Red Hat OpenStack for IBM Power | =6.0 | |
Nagios Plugins | <=4.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2014-5009 is considered a high-severity vulnerability, allowing remote attackers to execute arbitrary commands.
You can fix CVE-2014-5009 by updating the affected Nagios package to a version higher than 0:3.5.1-9.el6 or 0:3.5.1-9.el7.
CVE-2014-5009 affects various versions of Nagios and the Snoopy library included with it.
Yes, CVE-2014-5009 can significantly impact Nagios installations, especially those using vulnerable versions.
Yes, CVE-2014-5009 has known exploits that allow attackers to execute arbitrary commands remotely.