RULE(RULE ID:332481)

Rule General Information
Release Date: 2021-02-18
Rule Name: Nagios3 statuswml.cgi Ping Command Execution Vulnerability (CVE-2009-2288)
Severity:
CVE ID:
Rule Protection Details
Description: statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.
Impact: An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software.
Affected OS: Linux, Other Unix
Reference: SecurityTrackerID:1022503
http://marc.info/?l=bugtraq&m=126996888626964&w=2
http://security.gentoo.org/glsa/glsa-200907-15.xml
http://tracker.nagios.org/view.php?id=15
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
http://security.debian.org/pool/updates/main/n/nagios3/nagios3-common_ 3.0.6-4~lenny2_all.deb