Vulnerability Details : CVE-2013-7106
Multiple stack-based buffer overflows in Icinga before 1.8.5, 1.9 before 1.9.4, and 1.10 before 1.10.2 allow remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a long string to the (1) display_nav_table, (2) page_limit_selector, (3) print_export_link, or (4) page_num_selector function in cgi/cgiutils.c; (5) status_page_num_selector function in cgi/status.c; or (6) display_command_expansion function in cgi/config.c. NOTE: this can be exploited without authentication by leveraging CVE-2013-7107.
Vulnerability category: OverflowExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2013-7106
Probability of exploitation activity in the next 30 days: 1.55%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 85 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-7106
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST |
CWE ids for CVE-2013-7106
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-7106
-
https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/
Vendor Advisory
- https://dev.icinga.org/issues/5250
-
http://www.openwall.com/lists/oss-security/2013/12/16/4
oss-security - Fwd: Vulnerability (Buffer Overflow) in Icinga 1.8, 1.9 and 1.10 (Icinga Issue #5250) Vulnerability (Off-by-one memory access) in Icinga 1.8, 1.9 and 1.10 (Icinga Issue #5251)
Products affected by CVE-2013-7106
- cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:0.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:0.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:0.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:0.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:0.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.7.3:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.10.0:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.7.4:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.9.3:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.4.0:*:*:*:*:*:*:*