{"id":"MGASA-2016-0177","summary":"Updated xymon packages fix security vulnerabilities","details":"Updated xymon packages fix security vulnerabilities:\n\n\nThe incorrect handling of user-supplied input in the \"config\" command can\ntrigger a stack-based buffer overflow, resulting in denial of service (via\napplication crash) or remote code execution (CVE-2016-2054).\n\nThe incorrect handling of user-supplied input in the \"config\" command can\nlead to an information leak by serving sensitive configuration files to a\nremote user (CVE-2016-2055).\n\nThe commands handling password management do not properly validate\nuser-supplied input, and are thus vulnerable to shell command injection by a\nremote user (CVE-2016-2056).\n\nIncorrect permissions on an internal queuing system allow a user with a local\naccount on the xymon master server to bypass all network-based access control\nlists, and thus inject messages directly into xymon (CVE-2016-2057).\n\nIncorrect escaping of user-supplied input in status webpages can be used to\ntrigger reflected cross-site scripting attacks (CVE-2016-2058).\n\nNote that to effectively fix CVE-2016-2055, the /etc/xymon/xymonpasswd\nconfiguration file should be owned by user and group apache with 640\npermissions.\n","modified":"2026-04-16T06:22:54.265759658Z","published":"2016-05-18T20:14:22Z","upstream":["CVE-2016-2054","CVE-2016-2055","CVE-2016-2056","CVE-2016-2057","CVE-2016-2058"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2016-0177.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=17846"},{"type":"WEB","url":"https://www.debian.org/security/2016/dsa-3495"}],"affected":[{"package":{"name":"xymon","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/xymon?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.3.17-5.1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0177.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}