Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2007-5198

Опубликовано: 04 окт. 2007
Источник: debian
EPSS Средний

Описание

Buffer overflow in the redir function in check_http.c in Nagios Plugins before 1.4.10, when running with the -f (follow) option, allows remote web servers to execute arbitrary code via Location header responses (redirects) with a large number of leading "L" characters.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
nagios-pluginsfixed1.4.8-2.2package

Примечания

  • Requires the webserver, which has to be checked, to be compromised

EPSS

Процентиль: 94%
0.1546
Средний

Связанные уязвимости

ubuntu
почти 18 лет назад

Buffer overflow in the redir function in check_http.c in Nagios Plugins before 1.4.10, when running with the -f (follow) option, allows remote web servers to execute arbitrary code via Location header responses (redirects) with a large number of leading "L" characters.

redhat
около 18 лет назад

Buffer overflow in the redir function in check_http.c in Nagios Plugins before 1.4.10, when running with the -f (follow) option, allows remote web servers to execute arbitrary code via Location header responses (redirects) with a large number of leading "L" characters.

nvd
почти 18 лет назад

Buffer overflow in the redir function in check_http.c in Nagios Plugins before 1.4.10, when running with the -f (follow) option, allows remote web servers to execute arbitrary code via Location header responses (redirects) with a large number of leading "L" characters.

github
больше 3 лет назад

Buffer overflow in the redir function in check_http.c in Nagios Plugins before 1.4.10, when running with the -f (follow) option, allows remote web servers to execute arbitrary code via Location header responses (redirects) with a large number of leading "L" characters.

EPSS

Процентиль: 94%
0.1546
Средний