Bugzilla – Bug 1167659
VUL-0: CVE-2020-6582: nrpe: heap-based buffer overflow due to a wrong integer type conversion
Last modified: 2024-07-04 12:22:33 UTC
CVE-2020-6582 Nagios NRPE 3.2.1 has a Heap-Based Buffer Overflow, as demonstrated by interpretation of a small negative number as a large positive number during a bzero call. References: https://bugzilla.redhat.com/show_bug.cgi?id=1816813 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-6582 http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-6582.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6582 https://herolab.usd.de/security-advisories/usd-2020-0001/
Created attachment 833948 [details] nrpe-CVE-2020-6582-PoC.py Steps to reproduce: nrpe -n -c /etc/nrpe.cfg -4 -d ./nrpe-CVE-2020-6582-PoC.py The syslog should not show a segmentation fault in nrpe.
SUSE:SLE-11-SP1:Update nagios-nrpe Not affected [1] SUSE:SLE-12:Update nrpe Not affected [1] [1] The affected code (v3 packet support) does not exist yet.
openSUSE:Factory nrpe Affected [1] openSUSE:Leap:15.1 nrpe Affected [1] [1] Reproducible: >nrpe[3592]: segfault at 55565acd5000 ip 00007f7301e2b67d sp 00007fff40f3a7b8 error 6 in libc-2.31.so[7f7301cec000+14c000]
Fixed in openSUSE:Factory/nrpe openSUSE:Backports:SLE-15-SP5:Update/nrpe openSUSE:Backports:SLE-15-SP6:Update/nrpe