Unknown
CVE-2013-7106
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Multiple stack-based buffer overflows in Icinga before 1.8.5, 1.9 before 1.9.4, and 1.10 before 1.10.2 allow remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a long string to the (1) display_nav_table, (2) page_limit_selector, (3) print_export_link, or (4) page_num_selector function in cgi/cgiutils.c; (5) status_page_num_selector function in cgi/status.c; or (6) display_command_expansion function in cgi/config.c. NOTE: this can be exploited without authentication by leveraging CVE-2013-7107.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- icinga,
- icinga 0.8.0,
- icinga 0.8.1,
- icinga 0.8.2,
- icinga 0.8.3,
- icinga 0.8.4,
- icinga 1.0,
- icinga 1.0.1,
- icinga 1.0.2,
- icinga 1.0.3,
- icinga 1.10.0,
- icinga 1.10.1,
- icinga 1.2.0,
- icinga 1.2.1,
- icinga 1.3.0,
- icinga 1.3.1,
- icinga 1.4.0,
- icinga 1.4.1,
- icinga 1.6.0,
- icinga 1.6.1,
- icinga 1.6.2,
- icinga 1.7.0,
- icinga 1.7.1,
- icinga 1.7.2,
- icinga 1.7.3,
- icinga 1.7.4,
- icinga 1.8.0,
- icinga 1.8.1,
- icinga 1.8.2,
- icinga 1.8.3,
- icinga 1.9.0,
- icinga 1.9.1,
- icinga 1.9.2,
- icinga 1.9.3
References
Advisory
Miscellaneous
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: