<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for monit</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:2877-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-11-22T13:51:24Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-11-22T13:51:24Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-11-22T13:51:24Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for monit</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for monit fixes the following issues:

- CVE-2016-7067: A malicious attacker could have used a cross-site request forgery
                 vulnerability to trick an authenticated user to perform monit
                 actions.

Monit was updated to 5.20, containing all upstream improvements and bug fixes.

The following tracked packaging bugs were fixed:

- disable sslv3 according to RFC7568 (boo#974763)
- fixed pid file directory (boo#971647)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-updates/2016-11/msg00097.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:2877-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.1">
      <Branch Type="Product Name" Name="openSUSE Leap 42.1">
        <FullProductName ProductID="openSUSE Leap 42.1">openSUSE Leap 42.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 42.2">
      <Branch Type="Product Name" Name="openSUSE Leap 42.2">
        <FullProductName ProductID="openSUSE Leap 42.2">openSUSE Leap 42.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="monit-5.20.0-13.1">
      <FullProductName ProductID="monit-5.20.0-13.1">monit-5.20.0-13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="monit-doc-5.20.0-13.1">
      <FullProductName ProductID="monit-doc-5.20.0-13.1">monit-doc-5.20.0-13.1</FullProductName>
    </Branch>
    <Relationship ProductReference="monit-5.20.0-13.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:monit-5.20.0-13.1">monit-5.20.0-13.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="monit-doc-5.20.0-13.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:monit-doc-5.20.0-13.1">monit-doc-5.20.0-13.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="monit-5.20.0-13.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:monit-5.20.0-13.1">monit-5.20.0-13.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="monit-doc-5.20.0-13.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:monit-doc-5.20.0-13.1">monit-doc-5.20.0-13.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.</Note>
    </Notes>
    <CVE>CVE-2014-3566</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:monit-5.20.0-13.1</ProductID>
        <ProductID>openSUSE Leap 42.1:monit-doc-5.20.0-13.1</ProductID>
        <ProductID>openSUSE Leap 42.2:monit-5.20.0-13.1</ProductID>
        <ProductID>openSUSE Leap 42.2:monit-doc-5.20.0-13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-11/msg00097.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3566.html</URL>
        <Description>CVE-2014-3566</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011293</URL>
        <Description>SUSE Bug 1011293</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1031023</URL>
        <Description>SUSE Bug 1031023</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/901223</URL>
        <Description>SUSE Bug 901223</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/901254</URL>
        <Description>SUSE Bug 901254</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/901277</URL>
        <Description>SUSE Bug 901277</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/901748</URL>
        <Description>SUSE Bug 901748</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/901757</URL>
        <Description>SUSE Bug 901757</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/901759</URL>
        <Description>SUSE Bug 901759</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/901889</URL>
        <Description>SUSE Bug 901889</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/901968</URL>
        <Description>SUSE Bug 901968</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/902229</URL>
        <Description>SUSE Bug 902229</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/902476</URL>
        <Description>SUSE Bug 902476</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/902912</URL>
        <Description>SUSE Bug 902912</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/903405</URL>
        <Description>SUSE Bug 903405</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/903684</URL>
        <Description>SUSE Bug 903684</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/903690</URL>
        <Description>SUSE Bug 903690</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/903692</URL>
        <Description>SUSE Bug 903692</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/904889</URL>
        <Description>SUSE Bug 904889</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/905106</URL>
        <Description>SUSE Bug 905106</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/914041</URL>
        <Description>SUSE Bug 914041</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Monit before version 5.20.0 is vulnerable to a cross site request forgery attack. Successful exploitation will enable an attacker to disable/enable all monitoring for a particular host or disable/enable monitoring for a specific service.</Note>
    </Notes>
    <CVE>CVE-2016-7067</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:monit-5.20.0-13.1</ProductID>
        <ProductID>openSUSE Leap 42.1:monit-doc-5.20.0-13.1</ProductID>
        <ProductID>openSUSE Leap 42.2:monit-5.20.0-13.1</ProductID>
        <ProductID>openSUSE Leap 42.2:monit-doc-5.20.0-13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-11/msg00097.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7067.html</URL>
        <Description>CVE-2016-7067</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007455</URL>
        <Description>SUSE Bug 1007455</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
