Vulnerability Details : CVE-2007-5198
Buffer overflow in the redir function in check_http.c in Nagios Plugins before 1.4.10, when running with the -f (follow) option, allows remote web servers to execute arbitrary code via Location header responses (redirects) with a large number of leading "L" characters.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2007-5198
Probability of exploitation activity in the next 30 days: 2.10%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 88 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2007-5198
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
[email protected] |
CWE ids for CVE-2007-5198
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: [email protected] (Primary)
References for CVE-2007-5198
- http://www.debian.org/security/2008/dsa-1495
-
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00320.html
-
http://www.vupen.com/english/advisories/2007/3394
- http://www.novell.com/linux/security/advisories/2007_25_sr.html
-
http://sourceforge.net/forum/forum.php?forum_id=740172
-
http://sourceforge.net/tracker/index.php?func=detail&aid=1813346&group_id=29880&atid=397597
-
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00282.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:067
- http://security.gentoo.org/glsa/glsa-200711-11.xml
-
http://www.securityfocus.com/bid/25952
-
http://www.ubuntu.com/usn/usn-532-1
-
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00249.html
-
http://bugs.gentoo.org/show_bug.cgi?id=194178
-
http://sourceforge.net/tracker/index.php?func=detail&aid=1687867&group_id=29880&atid=397597
Exploit
Products affected by CVE-2007-5198
- cpe:2.3:a:nagios:plugins:*:*:*:*:*:*:*:*