Bug 874743 (CVE-2014-2913) - VUL-0: CVE-2014-2913: nagios-nrpe: remote command execution when command arguments are enabled
Summary: VUL-0: CVE-2014-2913: nagios-nrpe: remote command execution when command argu...
Status: RESOLVED FIXED
Alias: CVE-2014-2913
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Major
Target Milestone: ---
Deadline: 2014-04-30
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/98100/
Whiteboard: maint:released:sle11-sp1:57213
Keywords:
Depends on:
Blocks:
 
Reported: 2014-04-23 08:55 UTC by Alexander Bergmann
Modified: 2024-04-24 12:30 UTC (History)
4 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2014-04-23 08:55:12 UTC
Via rh#1089878:

A remote, command execution flaw was discovered in Nagios NRPE when command arguments are enabled. A remote attacker could use this flaw to execute arbitrary commands. This issue affects versions 2.15 and older.

Command arguments are disabled by default ("dont_blame_nrpe=0" in "/etc/nagios/nrpe.cfg"), and the security risk of enabling them is documented.

Some discussion about the fix is available on the oss-security list: http://seclists.org/oss-sec/2014/q2/129

Upstream fix:
--- nrpe/src/nrpe.c
+++ nrpe/src/nrpe.c
@@ -42,7 +42,7 @@ int use_ssl=FALSE;

 #define DEFAULT_COMMAND_TIMEOUT    60            /* default timeout
for execution of plugins */
 #define MAXFD                   64
-#define NASTY_METACHARS         "|`&><'\"\\[]{};"
+#define NASTY_METACHARS         "|`&><'\"\\[]{};\n"

 char    *command_name=NULL;
 char    *macro_argv[MAX_COMMAND_ARGUMENTS];


CVE-2014-2913 was assigned to this issue.

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1089878
Comment 1 Swamp Workflow Management 2014-04-23 08:57:13 UTC
The SWAMPID for this issue is 57094.
This issue was rated as important.
Please submit fixed packages until 2014-04-30.
When done, please reassign the bug to security-team@suse.de.
Patchinfo will be handled by security team.
Comment 2 SMASH SMASH 2014-04-23 09:00:15 UTC
Affected packages:

SLE-11-SP3: nagios-nrpe
SLE-11-SP1: nagios-nrpe
Comment 3 Alexander Bergmann 2014-04-23 09:03:19 UTC
Affected openSUSE code streams:

openSUSE:12.3  nrpe-2.14
openSUSE:13.1  nrpe-2.15
Comment 9 Swamp Workflow Management 2014-04-23 22:00:28 UTC
bugbot adjusting priority
Comment 10 Lars Vogdt 2014-04-24 13:55:42 UTC
Patched package submitted for SLE-11-SP1: nagios-nrpe.

No source found for SLE-11-SP3: nagios-nrpe - can you please give me an advice where to find it ?

Patches for openSUSE versions prepared, but as OBS is down at the moment, I'm unable to submit.
Comment 12 Bernhard Wiedemann 2014-04-25 09:00:26 UTC
This is an autogenerated message for OBS integration:
This bug (874743) was mentioned in
https://build.opensuse.org/request/show/231369 13.1+12.3 / nrpe
Comment 13 Alexander Bergmann 2014-04-25 09:53:45 UTC
The submission for SLE-11-SP1 should be sufficient also for SLE-11-SP3. 
So nothing to do for you. 

Assigning back to security.
Comment 14 Swamp Workflow Management 2014-05-02 13:05:35 UTC
openSUSE-SU-2014:0594-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 874743
CVE References: CVE-2014-2913
Sources used:
openSUSE 13.1 (src):    nrpe-2.15-4.1
openSUSE 12.3 (src):    nrpe-2.14-3.4.1
Comment 15 Swamp Workflow Management 2014-05-02 14:04:35 UTC
openSUSE-SU-2014:0603-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 874743
CVE References: CVE-2014-2913
Sources used:
openSUSE 11.4 (src):    nagios-nrpe-2.12-29.1
Comment 16 Sebastian Krahmer 2014-05-20 07:22:01 UTC
released
Comment 17 Swamp Workflow Management 2014-05-20 08:04:22 UTC
Update released for: nagios-nrpe, nagios-nrpe-debuginfo, nagios-nrpe-debugsource, nagios-nrpe-doc, nagios-plugins-nrpe
Products:
SLE-DEBUGINFO 11-SP1-TERADATA (x86_64)
SLE-SERVER 11-SP1-TERADATA (x86_64)
Comment 18 Swamp Workflow Management 2014-05-20 13:48:39 UTC
Update released for: nagios-nrpe, nagios-nrpe-debuginfo, nagios-nrpe-debugsource, nagios-nrpe-doc, nagios-plugins-nrpe
Products:
SLE-SERVER 11-SP3 (i386, ia64, ppc64, s390x, x86_64)
SLES4VMWARE 11-SP3 (i386, x86_64)
Comment 19 Swamp Workflow Management 2014-05-20 17:04:29 UTC
SUSE-SU-2014:0682-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 874743
CVE References: CVE-2014-2913
Sources used:
SUSE Linux Enterprise Server 11 SP3 for VMware (src):    nagios-nrpe-2.12-24.4.10.1
SUSE Linux Enterprise Server 11 SP3 (src):    nagios-nrpe-2.12-24.4.10.1
Comment 20 Maintenance Automation 2024-04-24 12:30:22 UTC
SUSE-SU-2024:1417-1: An update that solves one vulnerability and has one security fix can now be installed.

Category: security (important)
Bug References: 1118590, 874743
CVE References: CVE-2014-2913
Maintenance Incident: [SUSE:Maintenance:33416](https://smelt.suse.de/incident/33416/)
Sources used:
SUSE Linux Enterprise High Performance Computing 12 SP5 (src):
 nrpe-2.15-6.6.1
SUSE Linux Enterprise Server 12 SP5 (src):
 nrpe-2.15-6.6.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src):
 nrpe-2.15-6.6.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.