Secunia Security Advisory - Ubuntu has issued an update for nagios-plugins. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.
1e3587a81a06930e7b47c7f1701c2fb8687ec492fd744ba0a0bb95121c0dad85
----------------------------------------------------------------------
Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.
The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,700 different Windows applications.
Request your account, the Secunia Network Software Inspector (NSI):
http://secunia.com/network_software_inspector/
----------------------------------------------------------------------
TITLE:
Ubuntu update for nagios-plugins
SECUNIA ADVISORY ID:
SA27362
VERIFY ADVISORY:
http://secunia.com/advisories/27362/
CRITICAL:
Moderately critical
IMPACT:
System access
WHERE:
>From remote
OPERATING SYSTEM:
Ubuntu Linux 6.06
http://secunia.com/product/10611/
DESCRIPTION:
Ubuntu has issued an update for nagios-plugins. This fixes a
vulnerability, which can be exploited by malicious people to
compromise a vulnerable system.
For more information:
SA27124
SOLUTION:
Apply updated packages.
-- Ubuntu 6.06 LTS --
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/n/nagios-plugins/nagios-plugins_1.4.2-5ubuntu3.1.diff.gz
Size/MD5:40038 2ce232319f1412bd31218e4f80f379aa
http://security.ubuntu.com/ubuntu/pool/main/n/nagios-plugins/nagios-plugins_1.4.2-5ubuntu3.1.dsc
Size/MD5: 1054 a0c28730ba822bef978cf7428447320a
http://security.ubuntu.com/ubuntu/pool/main/n/nagios-plugins/nagios-plugins_1.4.2.orig.tar.gz
Size/MD5: 973712 5ac95978cc49c35132a5a2ea1c985c20
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/n/nagios-plugins/nagios-plugins-basic_1.4.2-5ubuntu3.1_amd64.deb
Size/MD5: 265222 1ebcbca55e85bee9e0579a98227aa5ac
http://security.ubuntu.com/ubuntu/pool/main/n/nagios-plugins/nagios-plugins-standard_1.4.2-5ubuntu3.1_amd64.deb
Size/MD5: 159170 62cb762bf4b953aab1cbe8a2ce5ddf33
http://security.ubuntu.com/ubuntu/pool/main/n/nagios-plugins/nagios-plugins_1.4.2-5ubuntu3.1_amd64.deb
Size/MD5:64236 c67353629a02a09f5bc863dfc76311b6
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/n/nagios-plugins/nagios-plugins-basic_1.4.2-5ubuntu3.1_i386.deb
Size/MD5: 226406 1edb66f9f3d896f32604261ca5fc6de7
http://security.ubuntu.com/ubuntu/pool/main/n/nagios-plugins/nagios-plugins-standard_1.4.2-5ubuntu3.1_i386.deb
Size/MD5: 142844 665cc990cfc20064cd5df981e2836db7
http://security.ubuntu.com/ubuntu/pool/main/n/nagios-plugins/nagios-plugins_1.4.2-5ubuntu3.1_i386.deb
Size/MD5:64224 23d300cb4585debe59cc7652ee8b0732
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/n/nagios-plugins/nagios-plugins-basic_1.4.2-5ubuntu3.1_powerpc.deb
Size/MD5: 245756 78ec9be9d3b0e6d5c2d1821d93652cc1
http://security.ubuntu.com/ubuntu/pool/main/n/nagios-plugins/nagios-plugins-standard_1.4.2-5ubuntu3.1_powerpc.deb
Size/MD5: 159026 f2617d51e4cfd9ee1e44c27c609eb3d3
http://security.ubuntu.com/ubuntu/pool/main/n/nagios-plugins/nagios-plugins_1.4.2-5ubuntu3.1_powerpc.deb
Size/MD5:64234 abd123c2d7c19a789617a902e91857af
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/n/nagios-plugins/nagios-plugins-basic_1.4.2-5ubuntu3.1_sparc.deb
Size/MD5: 234452 167d37e690c2e8553e0cc15eca80ef89
http://security.ubuntu.com/ubuntu/pool/main/n/nagios-plugins/nagios-plugins-standard_1.4.2-5ubuntu3.1_sparc.deb
Size/MD5: 144714 87eaaf687549fcb4f9de76c7a33accb9
http://security.ubuntu.com/ubuntu/pool/main/n/nagios-plugins/nagios-plugins_1.4.2-5ubuntu3.1_sparc.deb
Size/MD5:64232 2f26e0b30e1e06ed8f5ecfdffb16a2e0
ORIGINAL ADVISORY:
http://www.ubuntu.com/usn/usn-532-1
OTHER REFERENCES:
SA27124:
http://secunia.com/advisories/27124/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------