Show filters
37 Total Results
Displaying 21-30 of 37
Sort by:
Attacker Value
Unknown
CVE-2018-6533
Disclosure Date: February 27, 2018 (last updated November 26, 2024)
An issue was discovered in Icinga 2.x through 2.8.1. By editing the init.conf file, Icinga 2 can be run as root. Following this the program can be used to run arbitrary code as root. This was fixed by no longer using init.conf to determine account information for any root-executed code (a larger issue than CVE-2017-16933).
0
Attacker Value
Unknown
CVE-2018-6532
Disclosure Date: February 27, 2018 (last updated November 26, 2024)
An issue was discovered in Icinga 2.x through 2.8.1. By sending specially crafted (authenticated and unauthenticated) requests, an attacker can exhaust a lot of memory on the server side, triggering the OOM killer.
0
Attacker Value
Unknown
CVE-2018-6534
Disclosure Date: February 27, 2018 (last updated November 26, 2024)
An issue was discovered in Icinga 2.x through 2.8.1. By sending specially crafted messages, an attacker can cause a NULL pointer dereference, which can cause the product to crash.
0
Attacker Value
Unknown
CVE-2018-6535
Disclosure Date: February 27, 2018 (last updated November 26, 2024)
An issue was discovered in Icinga 2.x through 2.8.1. The lack of a constant-time password comparison function can disclose the password to an attacker.
0
Attacker Value
Unknown
CVE-2018-6536
Disclosure Date: February 02, 2018 (last updated November 26, 2024)
An issue was discovered in Icinga 2.x through 2.8.1. The daemon creates an icinga2.pid file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for icinga2.pid modification before a root script executes a "kill `cat /pathname/icinga2.pid`" command, as demonstrated by icinga2.init.d.cmake.
0
Attacker Value
Unknown
CVE-2017-16933
Disclosure Date: November 24, 2017 (last updated November 26, 2024)
etc/initsystem/prepare-dirs in Icinga 2.x through 2.8.1 has a chown call for a filename in a user-writable directory, which allows local users to gain privileges by leveraging access to the $ICINGA2_USER account for creation of a link.
0
Attacker Value
Unknown
CVE-2017-16882
Disclosure Date: November 18, 2017 (last updated November 26, 2024)
Icinga Core through 1.14.0 initially executes bin/icinga as root but supports configuration options in which this file is owned by a non-root account (and similarly can have etc/icinga.cfg owned by a non-root account), which allows local users to gain privileges by leveraging access to this non-root account, a related issue to CVE-2017-14312. This also affects bin/icingastats, bin/ido2db, and bin/log2ido.
0
Attacker Value
Unknown
CVE-2015-8010
Disclosure Date: March 27, 2017 (last updated November 26, 2024)
Cross-site scripting (XSS) vulnerability in the Classic-UI with the CSV export link and pagination feature in Icinga before 1.14 allows remote attackers to inject arbitrary web script or HTML via the query string to cgi-bin/status.cgi.
0
Attacker Value
Unknown
CVE-2014-2386
Disclosure Date: March 25, 2014 (last updated October 05, 2023)
Multiple off-by-one errors in Icinga, possibly 1.10.2 and earlier, allow remote attackers to cause a denial of service (crash) via unspecified vectors to the (1) display_nav_table, (2) print_export_link, (3) page_num_selector, or (4) page_limit_selector function in cgi/cgiutils.c or (5) status_page_num_selector function in cgi/status.c, which triggers a stack-based buffer overflow.
0
Attacker Value
Unknown
CVE-2014-1878
Disclosure Date: February 28, 2014 (last updated October 05, 2023)
Stack-based buffer overflow in the cmd_submitf function in cgi/cmd.c in Nagios Core, possibly 4.0.3rc1 and earlier, and Icinga before 1.8.6, 1.9 before 1.9.5, and 1.10 before 1.10.3 allows remote attackers to cause a denial of service (segmentation fault) via a long message to cmd.cgi.
0