Addressing security vulnerabilities
Andreas Ericsson
ae at op5.se
Wed Nov 28 12:36:27 CET 2012
On 11/27/2012 05:11 PM, Rudolph Pereira wrote:
> Hi all,
>
> I submitted http://tracker.nagios.org/view.php?id=400 a while ago and
> have had little to no response on it, even though it is a serious
> issue.
>
> I am looking for suggestions on how to deal with this; given the
> seriousness of the issue and how many users it affects I believe a
> security vulnerability notice should go out at the very least. Should
> I be working with ocert or some other intermediary on this?
>
Have you tested this exploit? It might be blocked by how NRPE handles
command line arguments.
One very simple way around it would otherwise be to disallow relative
paths to commands and use execve() to execute the checks. That way,
the plugin will get '$(lalafoo)' as an argument rather than the output
of that command.
--
Andreas Ericsson andreas.ericsson at op5.se
OP5 AB www.op5.se
Tel: +46 8-230225 Fax: +46 8-230231
Considering the successes of the wars on alcohol, poverty, drugs and
terror, I think we should give some serious thought to declaring war
on peace.
------------------------------------------------------------------------------
Keep yourself connected to Go Parallel:
INSIGHTS What's next for parallel hardware, programming and related areas?
Interviews and blogs by thought leaders keep you ahead of the curve.
http://goparallel.sourceforge.net
More information about the Developers
mailing list