Secunia Security Advisory - Ubuntu has issued an update for nagios2. This fixes some vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions or by malicious people to conduct cross-site request forgery attacks.
0fcfe7c20c12854b6d100d717586636d7552e524c9262c705a53e061416c42ee
----------------------------------------------------------------------
Did you know that a change in our assessment rating, exploit code
availability, or if an updated patch is released by the vendor, is
not part of this mailing-list?
Click here to learn more:
http://secunia.com/advisories/business_solutions/
----------------------------------------------------------------------
TITLE:
Ubuntu update for nagios2
SECUNIA ADVISORY ID:
SA33320
VERIFY ADVISORY:
http://secunia.com/advisories/33320/
CRITICAL:
Less critical
IMPACT:
Security Bypass, Cross Site Scripting
WHERE:
>From remote
OPERATING SYSTEM:
Ubuntu Linux 8.04
http://secunia.com/advisories/product/18611/
DESCRIPTION:
Ubuntu has issued an update for nagios2. This fixes some
vulnerabilities, which can be exploited by malicious users to bypass
certain security restrictions or by malicious people to conduct
cross-site request forgery attacks.
For more information:
SA32543
SA32610
SOLUTION:
Apply updated packages and restart nagios.
-- Ubuntu 8.04 LTS --
Source archives:
http://security.ubuntu.com/ubuntu/pool/universe/n/nagios2/nagios2_2.11-1ubuntu1.4.diff.gz
Size/MD5: 37439 1e9c238bb21704f42d6275c31cf99108
http://security.ubuntu.com/ubuntu/pool/universe/n/nagios2/nagios2_2.11-1ubuntu1.4.dsc
Size/MD5: 1174 99b9d7ca524be867d538f8f39d52f0cf
http://security.ubuntu.com/ubuntu/pool/universe/n/nagios2/nagios2_2.11.orig.tar.gz
Size/MD5: 1741962 058c1f4829de748b42da1b584cccc941
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/universe/n/nagios2/nagios2-common_2.11-1ubuntu1.4_all.deb
Size/MD5: 61506 c4f5c96b1c8be0e58c362eb005efba9c
http://security.ubuntu.com/ubuntu/pool/universe/n/nagios2/nagios2-doc_2.11-1ubuntu1.4_all.deb
Size/MD5: 1135002 0515ced55e66978706203bdac4055b39
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/universe/n/nagios2/nagios2-dbg_2.11-1ubuntu1.4_amd64.deb
Size/MD5: 1640150 d23994c62750473a55138f10935318b6
http://security.ubuntu.com/ubuntu/pool/universe/n/nagios2/nagios2_2.11-1ubuntu1.4_amd64.deb
Size/MD5: 1106218 d2ca0e16009ae6738cae6efd29f243df
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/universe/n/nagios2/nagios2-dbg_2.11-1ubuntu1.4_i386.deb
Size/MD5: 1552138 4a165fc1202e3dcc4c7af4eeaa8f14cb
http://security.ubuntu.com/ubuntu/pool/universe/n/nagios2/nagios2_2.11-1ubuntu1.4_i386.deb
Size/MD5: 987174 73ba6b8faef90259a965ad3c2aee176e
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/universe/n/nagios2/nagios2-dbg_2.11-1ubuntu1.4_lpia.deb
Size/MD5: 1586750 161d8bbc1d2f8251aa0888c326152763
http://ports.ubuntu.com/pool/universe/n/nagios2/nagios2_2.11-1ubuntu1.4_lpia.deb
Size/MD5: 999124 984199f0814041fb1d3be332c78a1084
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/universe/n/nagios2/nagios2-dbg_2.11-1ubuntu1.4_powerpc.deb
Size/MD5: 1609376 fc3975c98bf065371fd8a0230d1007c5
http://ports.ubuntu.com/pool/universe/n/nagios2/nagios2_2.11-1ubuntu1.4_powerpc.deb
Size/MD5: 1109530 a5e36a48935587ccfc565376a5ea58fa
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/universe/n/nagios2/nagios2-dbg_2.11-1ubuntu1.4_sparc.deb
Size/MD5: 1448326 2fc971f58d9891abd1d2babe018742ef
http://ports.ubuntu.com/pool/universe/n/nagios2/nagios2_2.11-1ubuntu1.4_sparc.deb
Size/MD5: 989588 158c615af339c126f07fcc8b3e05480a
ORIGINAL ADVISORY:
USN-698-3:
https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-December/000815.html
OTHER REFERENCES:
SA32543:
http://secunia.com/advisories/32543/
SA32610:
http://secunia.com/advisories/32610/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------