Updated xymon packages fix security vulnerabilities
Publication date: 18 May 2016Modification date: 18 May 2016
Type: security
Affected Mageia releases : 5
CVE: CVE-2016-2054 , CVE-2016-2055 , CVE-2016-2056 , CVE-2016-2057 , CVE-2016-2058
Description
Updated xymon packages fix security vulnerabilities: The incorrect handling of user-supplied input in the "config" command can trigger a stack-based buffer overflow, resulting in denial of service (via application crash) or remote code execution (CVE-2016-2054). The incorrect handling of user-supplied input in the "config" command can lead to an information leak by serving sensitive configuration files to a remote user (CVE-2016-2055). The commands handling password management do not properly validate user-supplied input, and are thus vulnerable to shell command injection by a remote user (CVE-2016-2056). Incorrect permissions on an internal queuing system allow a user with a local account on the xymon master server to bypass all network-based access control lists, and thus inject messages directly into xymon (CVE-2016-2057). Incorrect escaping of user-supplied input in status webpages can be used to trigger reflected cross-site scripting attacks (CVE-2016-2058). Note that to effectively fix CVE-2016-2055, the /etc/xymon/xymonpasswd configuration file should be owned by user and group apache with 640 permissions.
References
- https://bugs.mageia.org/show_bug.cgi?id=17846
- https://www.debian.org/security/2016/dsa-3495
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2054
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2055
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2056
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2057
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2058
SRPMS
5/core
- xymon-4.3.17-5.1.mga5