RULE(RULE ID:323906)

Rule General Information
Release Date: 2019-11-29
Rule Name: Xymon useradm Command Execution Vulnerability (CVE-2016-2056)
Severity:
CVE ID:
Rule Protection Details
Description: xymond in Xymon 4.1.x, 4.2.x, and 4.3.x before 4.3.25 allow remote authenticated users to execute arbitrary commands via shell metacharacters in the adduser_name argument in (1) web/useradm.c or (2) web/chpasswd.c.
Impact: An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software.
Affected OS: Windows, Linux, Others
Reference: http://packetstormsecurity.com/files/135758/Xymon-4.3.x-Buffer-Overflow-Code-Execution-Information-Disclosure.html
http://packetstormsecurity.com/files/153620/Xymon-useradm-Command-Execution.html
http://www.debian.org/security/2016/dsa-3495
http://www.securityfocus.com/archive/1/537522/100/0/threaded
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
http://lists.xymon.com/archive/2016-February/042986.html