<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">icinga-1.13.3-2.4 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10182</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">icinga-1.13.3-2.4 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the icinga-1.13.3-2.4 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10182</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10182</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-6096/</URL>
      <Description>SUSE CVE CVE-2012-6096 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-7107/</URL>
      <Description>SUSE CVE CVE-2013-7107 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-7108/</URL>
      <Description>SUSE CVE CVE-2013-7108 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-2386/</URL>
      <Description>SUSE CVE CVE-2014-2386 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="icinga-1.13.3-2.4">
      <FullProductName ProductID="icinga-1.13.3-2.4">icinga-1.13.3-2.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="icinga-devel-1.13.3-2.4">
      <FullProductName ProductID="icinga-devel-1.13.3-2.4">icinga-devel-1.13.3-2.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="icinga-doc-1.13.3-2.4">
      <FullProductName ProductID="icinga-doc-1.13.3-2.4">icinga-doc-1.13.3-2.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="icinga-idoutils-1.13.3-2.4">
      <FullProductName ProductID="icinga-idoutils-1.13.3-2.4">icinga-idoutils-1.13.3-2.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="icinga-idoutils-mysql-1.13.3-2.4">
      <FullProductName ProductID="icinga-idoutils-mysql-1.13.3-2.4">icinga-idoutils-mysql-1.13.3-2.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="icinga-idoutils-oracle-1.13.3-2.4">
      <FullProductName ProductID="icinga-idoutils-oracle-1.13.3-2.4">icinga-idoutils-oracle-1.13.3-2.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="icinga-idoutils-pgsql-1.13.3-2.4">
      <FullProductName ProductID="icinga-idoutils-pgsql-1.13.3-2.4">icinga-idoutils-pgsql-1.13.3-2.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="icinga-plugins-downtimes-1.13.3-2.4">
      <FullProductName ProductID="icinga-plugins-downtimes-1.13.3-2.4">icinga-plugins-downtimes-1.13.3-2.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="icinga-plugins-eventhandlers-1.13.3-2.4">
      <FullProductName ProductID="icinga-plugins-eventhandlers-1.13.3-2.4">icinga-plugins-eventhandlers-1.13.3-2.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="icinga-www-1.13.3-2.4">
      <FullProductName ProductID="icinga-www-1.13.3-2.4">icinga-www-1.13.3-2.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="icinga-www-config-1.13.3-2.4">
      <FullProductName ProductID="icinga-www-config-1.13.3-2.4">icinga-www-config-1.13.3-2.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="monitoring-tools-1.13.3-2.4">
      <FullProductName ProductID="monitoring-tools-1.13.3-2.4">monitoring-tools-1.13.3-2.4</FullProductName>
    </Branch>
    <Relationship ProductReference="icinga-1.13.3-2.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:icinga-1.13.3-2.4">icinga-1.13.3-2.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="icinga-devel-1.13.3-2.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:icinga-devel-1.13.3-2.4">icinga-devel-1.13.3-2.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="icinga-doc-1.13.3-2.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:icinga-doc-1.13.3-2.4">icinga-doc-1.13.3-2.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="icinga-idoutils-1.13.3-2.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:icinga-idoutils-1.13.3-2.4">icinga-idoutils-1.13.3-2.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="icinga-idoutils-mysql-1.13.3-2.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:icinga-idoutils-mysql-1.13.3-2.4">icinga-idoutils-mysql-1.13.3-2.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="icinga-idoutils-oracle-1.13.3-2.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:icinga-idoutils-oracle-1.13.3-2.4">icinga-idoutils-oracle-1.13.3-2.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="icinga-idoutils-pgsql-1.13.3-2.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:icinga-idoutils-pgsql-1.13.3-2.4">icinga-idoutils-pgsql-1.13.3-2.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="icinga-plugins-downtimes-1.13.3-2.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:icinga-plugins-downtimes-1.13.3-2.4">icinga-plugins-downtimes-1.13.3-2.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="icinga-plugins-eventhandlers-1.13.3-2.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:icinga-plugins-eventhandlers-1.13.3-2.4">icinga-plugins-eventhandlers-1.13.3-2.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="icinga-www-1.13.3-2.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:icinga-www-1.13.3-2.4">icinga-www-1.13.3-2.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="icinga-www-config-1.13.3-2.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:icinga-www-config-1.13.3-2.4">icinga-www-config-1.13.3-2.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="monitoring-tools-1.13.3-2.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:monitoring-tools-1.13.3-2.4">monitoring-tools-1.13.3-2.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple stack-based buffer overflows in the get_history function in history.cgi in Nagios Core before 3.4.4, and Icinga 1.6.x before 1.6.2, 1.7.x before 1.7.4, and 1.8.x before 1.8.4, might allow remote attackers to execute arbitrary code via a long (1) host_name variable (host parameter) or (2) svc_description variable.</Note>
    </Notes>
    <CVE>CVE-2012-6096</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:icinga-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-devel-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-doc-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-idoutils-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-idoutils-mysql-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-idoutils-oracle-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-idoutils-pgsql-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-plugins-downtimes-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-plugins-eventhandlers-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-www-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-www-config-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:monitoring-tools-1.13.3-2.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-6096.html</URL>
        <Description>CVE-2012-6096</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/797237</URL>
        <Description>SUSE Bug 797237</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Cross-site request forgery (CSRF) vulnerability in cmd.cgi in Icinga 1.8.5, 1.9.4, 1.10.2, and earlier allows remote attackers to hijack the authentication of users for unspecified commands via unspecified vectors, as demonstrated by bypassing authentication requirements for CVE-2013-7106.</Note>
    </Notes>
    <CVE>CVE-2013-7107</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:icinga-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-devel-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-doc-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-idoutils-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-idoutils-mysql-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-idoutils-oracle-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-idoutils-pgsql-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-plugins-downtimes-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-plugins-eventhandlers-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-www-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-www-config-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:monitoring-tools-1.13.3-2.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-7107.html</URL>
        <Description>CVE-2013-7107</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/859424</URL>
        <Description>SUSE Bug 859424</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple off-by-one errors in Nagios Core 3.5.1, 4.0.2, and earlier, and Icinga before 1.8.5, 1.9 before 1.9.4, and 1.10 before 1.10.2 allow remote authenticated users to obtain sensitive information from process memory or cause a denial of service (crash) via a long string in the last key value in the variable list to the process_cgivars function in (1) avail.c, (2) cmd.c, (3) config.c, (4) extinfo.c, (5) histogram.c, (6) notifications.c, (7) outages.c, (8) status.c, (9) statusmap.c, (10) summary.c, and (11) trends.c in cgi/, which triggers a heap-based buffer over-read.</Note>
    </Notes>
    <CVE>CVE-2013-7108</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:icinga-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-devel-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-doc-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-idoutils-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-idoutils-mysql-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-idoutils-oracle-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-idoutils-pgsql-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-plugins-downtimes-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-plugins-eventhandlers-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-www-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-www-config-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:monitoring-tools-1.13.3-2.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-7108.html</URL>
        <Description>CVE-2013-7108</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/856837</URL>
        <Description>SUSE Bug 856837</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple off-by-one errors in Icinga, possibly 1.10.2 and earlier, allow remote attackers to cause a denial of service (crash) via unspecified vectors to the (1) display_nav_table, (2) print_export_link, (3) page_num_selector, or (4) page_limit_selector function in cgi/cgiutils.c or (5) status_page_num_selector function in cgi/status.c, which triggers a stack-based buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2014-2386</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:icinga-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-devel-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-doc-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-idoutils-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-idoutils-mysql-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-idoutils-oracle-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-idoutils-pgsql-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-plugins-downtimes-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-plugins-eventhandlers-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-www-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:icinga-www-config-1.13.3-2.4</ProductID>
        <ProductID>openSUSE Tumbleweed:monitoring-tools-1.13.3-2.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-2386.html</URL>
        <Description>CVE-2014-2386</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/868426</URL>
        <Description>SUSE Bug 868426</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
