-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2009:187 http://www.mandriva.com/security/ _______________________________________________________________________ Package : nagios Date : August 1, 2009 Affected: Corporate 4.0, Enterprise Server 5.0 _______________________________________________________________________ Problem Description: A vulnerability has been found and corrected in nagios: statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters (CVE-2009-2288). This update provides nagios 3.1.2, which is not vulnerable to this issue. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2288 _______________________________________________________________________ Updated Packages: Corporate 4.0: 7472e8523c46ca410cefd9409a179268 corporate/4.0/i586/nagios-3.1.2-0.1.20060mlcs4.i586.rpm 89a90ebea94c9b6be5b96b29b057e941 corporate/4.0/i586/nagios-devel-3.1.2-0.1.20060mlcs4.i586.rpm ed9c5a112b2da874d94d77d9e487295f corporate/4.0/i586/nagios-theme-default-3.1.2-0.1.20060mlcs4.i586.rpm 1b5be207136af2bea3c57a6cae095d1f corporate/4.0/i586/nagios-www-3.1.2-0.1.20060mlcs4.i586.rpm 8727421dc7496303fbd8f61d2ad9ad7b corporate/4.0/SRPMS/nagios-3.1.2-0.1.20060mlcs4.src.rpm Corporate 4.0/X86_64: 0327db2ac9b511fa72c4a4ac7349ee0a corporate/4.0/x86_64/nagios-3.1.2-0.1.20060mlcs4.x86_64.rpm 7a36ca1cb34667d84d78f9b0b48f2976 corporate/4.0/x86_64/nagios-devel-3.1.2-0.1.20060mlcs4.x86_64.rpm a81e17fc9f68d97674c252f0266d6502 corporate/4.0/x86_64/nagios-theme-default-3.1.2-0.1.20060mlcs4.x86_64.rpm 6b4da1474cc9b4931fa8dcbe7f9b75ef corporate/4.0/x86_64/nagios-www-3.1.2-0.1.20060mlcs4.x86_64.rpm 8727421dc7496303fbd8f61d2ad9ad7b corporate/4.0/SRPMS/nagios-3.1.2-0.1.20060mlcs4.src.rpm Mandriva Enterprise Server 5: 248bc01aab687002a8358916e7b3fc82 mes5/i586/nagios-3.1.2-0.2mdvmes5.i586.rpm 44aeb0da66acda1d01549f56a190800f mes5/i586/nagios-devel-3.1.2-0.2mdvmes5.i586.rpm 305cefdd9a47d7ce8ab6a4fd388f02d6 mes5/i586/nagios-theme-default-3.1.2-0.2mdvmes5.i586.rpm 3333d2362e45a46a0eccbeed8719435e mes5/i586/nagios-www-3.1.2-0.2mdvmes5.i586.rpm e66cb2c237aed7e1e96251054a191413 mes5/SRPMS/nagios-3.1.2-0.2mdvmes5.src.rpm Mandriva Enterprise Server 5/X86_64: 6c37a65ce53a4795fe78747d2aa3b25c mes5/x86_64/nagios-3.1.2-0.2mdvmes5.x86_64.rpm b58de355fcb5f7fac50dc251c3ebbd54 mes5/x86_64/nagios-devel-3.1.2-0.2mdvmes5.x86_64.rpm 5dd3dca4fbb5530382d8b3aeb4fcf5b0 mes5/x86_64/nagios-theme-default-3.1.2-0.2mdvmes5.x86_64.rpm 3a216297c88bbf869440b3594ec27027 mes5/x86_64/nagios-www-3.1.2-0.2mdvmes5.x86_64.rpm e66cb2c237aed7e1e96251054a191413 mes5/SRPMS/nagios-3.1.2-0.2mdvmes5.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFKc4A/mqjQ0CJFipgRAoifAJ9WmG+u08se/DyR2TjZ2GX+nRpyLgCgkiKo DqUpIY99w28fMGbbq0S+quY= =0LGX -----END PGP SIGNATURE-----