[seanius at debian.org: Re: CVE-2006-2162: Buffer overflow in nagios]
Ethan Galstad
nagios at nagios.org
Mon May 15 18:54:58 CEST 2006
sean finney wrote:
> hey ethan,
>
> On Fri, May 12, 2006 at 05:22:44PM -0500, Ethan Galstad wrote:
>> Good point. How does the attached patch look for fixing this? I may
>> have to release the patch standalone for a few days, as the SourceForge
>> CVS servers are currently offline (!).
>
> fun...
>
> i believe the patch you give should prevent the problem from occurring.
>
> in debian, the patch we're using prints an error and returns error
> instead, which i think is slightly more optimal as i'm not sure what
> happens when the cgi script expects a content length different from what
> it's actually going to get. i'll attache what ew're using for
> reference.
>
> the first patch (16_foo) is against 1.x and the second (10_foo) is
> against 2.x
>
>
> sean
Thanks Sean - I think your patches are better, since they cause the CGIs
to exit, so I'll apply them and release new versions of Nagios later
today. Thanks again to you and the other Debian folks!
Ethan Galstad,
Nagios Developer
---
Email: nagios at nagios.org
Website: http://www.nagios.org
-------------------------------------------------------
Using Tomcat but need to do more? Need to support web services, security?
Get stuff done quickly with pre-integrated technology to make your job easier
Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642
More information about the Developers
mailing list