The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

security announce CVE-2018-13458

Nagios Core: NULL pointer dereference via qh_core

Synthesis of the vulnerability

An attacker can force a NULL pointer to be dereferenced via qh_core of Nagios Core, in order to trigger a denial of service.
Severity of this announce: 1/4.
Creation date: 13/07/2018.
Références of this computer vulnerability: CVE-2018-13458, FEDORA-2019-0b44528ff1, FEDORA-2019-376ecc221c, VIGILANCE-VUL-26737.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can force a NULL pointer to be dereferenced via qh_core of Nagios Core, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

This threat impacts software or systems such as Fedora, Nagios Open Source.

Our Vigil@nce team determined that the severity of this computer threat is low.

The trust level is of type confirmed by the editor, with an origin of user shell.

A proof of concept or an attack tool is available, so your teams have to process this alert. An attacker with a technician ability can exploit this cybersecurity bulletin.

Solutions for this threat

Nagios Core: version 4.4.2.
The version 4.4.2 is fixed:
  https://github.com/NagiosEnterprises/nagioscore/

Fedora: new nagios packages.
New packages are available:
  Fedora 28: nagios 4.4.3-1.fc28
  Fedora 29: nagios 4.4.3-1.fc29

Wind River Linux: solution (16/10/2018).
The solution is indicated in information sources.
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a software vulnerabilities bulletin. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.