Nagios: Buffer overflow — GLSA 200605-07 Nagios is vulnerable to a buffer overflow which may lead to remote execution of arbitrary code. Affected packages Package net-analyzer/nagios-core on all architectures Affected versions < 1.4.1 Unaffected versions >= 1.4.1 Background Nagios is an open source host, service and network monitoring program. Description Sebastian Krahmer of the SuSE security team discovered a buffer overflow vulnerability in the handling of a negative HTTP Content-Length header. Impact A buffer overflow in Nagios CGI scripts under certain web servers allows remote attackers to execute arbitrary code via a negative content length HTTP header. Workaround There is no known workaround at this time. Resolution All Nagios users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-analyzer/nagios-core-1.4.1" References CVE-2006-2162 CVE-2006-2489