<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for icinga</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:3258-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-10-19T11:14:04Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-10-19T11:14:04Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-10-19T11:14:04Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for icinga</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for icinga fixes the following issues:

Update to 1.14.0

- CVE-2015-8010: Fixed XSS in the icinga classic UI (boo#952777)
- CVE-2016-8641 / CVE-2016-10089: fixed a possible symlink attack for files/dirs created by root (boo#1011630 and boo#1018047)
- CVE-2016-0726: removed the pre-configured administrative account with fixed password for the WebUI - (boo#961115)

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00043.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:3258-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="icinga-1.14.0-8.3.2">
      <FullProductName ProductID="icinga-1.14.0-8.3.2">icinga-1.14.0-8.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="icinga-devel-1.14.0-8.3.2">
      <FullProductName ProductID="icinga-devel-1.14.0-8.3.2">icinga-devel-1.14.0-8.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="icinga-doc-1.14.0-8.3.2">
      <FullProductName ProductID="icinga-doc-1.14.0-8.3.2">icinga-doc-1.14.0-8.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="icinga-idoutils-1.14.0-8.3.2">
      <FullProductName ProductID="icinga-idoutils-1.14.0-8.3.2">icinga-idoutils-1.14.0-8.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="icinga-idoutils-mysql-1.14.0-8.3.2">
      <FullProductName ProductID="icinga-idoutils-mysql-1.14.0-8.3.2">icinga-idoutils-mysql-1.14.0-8.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="icinga-idoutils-oracle-1.14.0-8.3.2">
      <FullProductName ProductID="icinga-idoutils-oracle-1.14.0-8.3.2">icinga-idoutils-oracle-1.14.0-8.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="icinga-idoutils-pgsql-1.14.0-8.3.2">
      <FullProductName ProductID="icinga-idoutils-pgsql-1.14.0-8.3.2">icinga-idoutils-pgsql-1.14.0-8.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="icinga-plugins-downtimes-1.14.0-8.3.2">
      <FullProductName ProductID="icinga-plugins-downtimes-1.14.0-8.3.2">icinga-plugins-downtimes-1.14.0-8.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="icinga-plugins-eventhandlers-1.14.0-8.3.2">
      <FullProductName ProductID="icinga-plugins-eventhandlers-1.14.0-8.3.2">icinga-plugins-eventhandlers-1.14.0-8.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="icinga-www-1.14.0-8.3.2">
      <FullProductName ProductID="icinga-www-1.14.0-8.3.2">icinga-www-1.14.0-8.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="icinga-www-config-1.14.0-8.3.2">
      <FullProductName ProductID="icinga-www-config-1.14.0-8.3.2">icinga-www-config-1.14.0-8.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="monitoring-tools-1.14.0-8.3.2">
      <FullProductName ProductID="monitoring-tools-1.14.0-8.3.2">monitoring-tools-1.14.0-8.3.2</FullProductName>
    </Branch>
    <Relationship ProductReference="icinga-1.14.0-8.3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:icinga-1.14.0-8.3.2">icinga-1.14.0-8.3.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="icinga-devel-1.14.0-8.3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:icinga-devel-1.14.0-8.3.2">icinga-devel-1.14.0-8.3.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="icinga-doc-1.14.0-8.3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:icinga-doc-1.14.0-8.3.2">icinga-doc-1.14.0-8.3.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="icinga-idoutils-1.14.0-8.3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:icinga-idoutils-1.14.0-8.3.2">icinga-idoutils-1.14.0-8.3.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="icinga-idoutils-mysql-1.14.0-8.3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:icinga-idoutils-mysql-1.14.0-8.3.2">icinga-idoutils-mysql-1.14.0-8.3.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="icinga-idoutils-oracle-1.14.0-8.3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:icinga-idoutils-oracle-1.14.0-8.3.2">icinga-idoutils-oracle-1.14.0-8.3.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="icinga-idoutils-pgsql-1.14.0-8.3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:icinga-idoutils-pgsql-1.14.0-8.3.2">icinga-idoutils-pgsql-1.14.0-8.3.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="icinga-plugins-downtimes-1.14.0-8.3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:icinga-plugins-downtimes-1.14.0-8.3.2">icinga-plugins-downtimes-1.14.0-8.3.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="icinga-plugins-eventhandlers-1.14.0-8.3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:icinga-plugins-eventhandlers-1.14.0-8.3.2">icinga-plugins-eventhandlers-1.14.0-8.3.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="icinga-www-1.14.0-8.3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:icinga-www-1.14.0-8.3.2">icinga-www-1.14.0-8.3.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="icinga-www-config-1.14.0-8.3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:icinga-www-config-1.14.0-8.3.2">icinga-www-config-1.14.0-8.3.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="monitoring-tools-1.14.0-8.3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:monitoring-tools-1.14.0-8.3.2">monitoring-tools-1.14.0-8.3.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Cross-site scripting (XSS) vulnerability in the Classic-UI with the CSV export link and pagination feature in Icinga before 1.14 allows remote attackers to inject arbitrary web script or HTML via the query string to cgi-bin/status.cgi.</Note>
    </Notes>
    <CVE>CVE-2015-8010</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:icinga-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-devel-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-doc-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-idoutils-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-idoutils-mysql-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-idoutils-oracle-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-idoutils-pgsql-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-plugins-downtimes-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-plugins-eventhandlers-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-www-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-www-config-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:monitoring-tools-1.14.0-8.3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00043.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8010.html</URL>
        <Description>CVE-2015-8010</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/952777</URL>
        <Description>SUSE Bug 952777</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Fedora Nagios package uses "nagiosadmin" as the default password for the "nagiosadmin" administrator account, which makes it easier for remote attackers to obtain access by leveraging knowledge of the credentials.</Note>
    </Notes>
    <CVE>CVE-2016-0726</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:icinga-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-devel-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-doc-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-idoutils-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-idoutils-mysql-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-idoutils-oracle-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-idoutils-pgsql-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-plugins-downtimes-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-plugins-eventhandlers-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-www-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-www-config-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:monitoring-tools-1.14.0-8.3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00043.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0726.html</URL>
        <Description>CVE-2016-0726</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961115</URL>
        <Description>SUSE Bug 961115</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Nagios 4.3.2 and earlier allows local users to gain root privileges via a hard link attack on the Nagios init script file, related to CVE-2016-8641.</Note>
    </Notes>
    <CVE>CVE-2016-10089</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:icinga-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-devel-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-doc-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-idoutils-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-idoutils-mysql-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-idoutils-oracle-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-idoutils-pgsql-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-plugins-downtimes-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-plugins-eventhandlers-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-www-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-www-config-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:monitoring-tools-1.14.0-8.3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00043.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10089.html</URL>
        <Description>CVE-2016-10089</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011630</URL>
        <Description>SUSE Bug 1011630</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1018047</URL>
        <Description>SUSE Bug 1018047</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A privilege escalation vulnerability was found in nagios 4.2.x that occurs in daemon-init.in when creating necessary files and insecurely changing the ownership afterwards. It's possible for the local attacker to create symbolic links before the files are to be created and possibly escalating the privileges with the ownership change.</Note>
    </Notes>
    <CVE>CVE-2016-8641</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:icinga-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-devel-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-doc-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-idoutils-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-idoutils-mysql-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-idoutils-oracle-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-idoutils-pgsql-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-plugins-downtimes-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-plugins-eventhandlers-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-www-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:icinga-www-config-1.14.0-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.3:monitoring-tools-1.14.0-8.3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00043.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8641.html</URL>
        <Description>CVE-2016-8641</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011630</URL>
        <Description>SUSE Bug 1011630</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1018047</URL>
        <Description>SUSE Bug 1018047</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
