Warning: opendir(/var/www/html/web1/serendipity/plugins/serendipity_event_dpsyntaxhighlighter/sh/3.0.83.2/scripts/): failed to open dir: No such file or directory in /var/www/html/web1/serendipity/plugins/serendipity_event_dpsyntaxhighlighter/serendipity_event_dpsyntaxhighlighter.php on line 26

Warning: Invalid argument supplied for foreach() in /var/www/html/web1/serendipity/plugins/serendipity_event_dpsyntaxhighlighter/serendipity_event_dpsyntaxhighlighter.php on line 170
Skip to content

SSCHADV2011-040 - Nagios Plugin 'check_ups' Local Buffer Overflow

Advisory:
Nagios Plugin 'check_ups' Local Buffer Overflow
Advisory ID:
SSCHADV2011-040
Author:
Stefan Schurtz
Affected Software:
Successfully tested on nagios-plugins-1.4.15
Vendor URL:
Vendor Status:
informed
EDB-ID:
18278
 
==========================
Vulnerability Description:
==========================
 
The Nagios plugin 'check_ups' is prone to a Buffer Overflow
 
Continue reading "SSCHADV2011-040 - Nagios Plugin 'check_ups' Local Buffer Overflow"

SSCHADV2011-003 - Cross-Site Scripting vulnerability in Icinga

Advisory: Cross-Site Scripting vulnerability in Icinga
Advisory ID: SSCHADV2011-003
Author: Stefan Schurtz
Affected Software: Successfully tested on: icinga-1.3.0 / icinga-1.2.1
Vendor URL: http://www.icinga.org
Vendor Status:
statusmap.cgi: fixed XSS vulnerability #1281
Target version set to 1.4
OSVDB-ID: 71052
 
======================
Vulnerability Description:
======================

This is a Cross-Site Scripting vulnerability

JavaScript can be included in style sheets by using "expression()" (IE only)

==============
Technical Details:
==============
Continue reading "SSCHADV2011-003 - Cross-Site Scripting vulnerability in Icinga"

SSCHADV2011-002 - Cross-Site Scripting vulnerability in Nagios

 
Advisory:  Cross-Site Scripting vulnerability in Nagios
Advisory ID:  SSCHADV2011-002
Author:  Stefan Schurtz
Affected Software: Successfully tested on: nagios-3.2.0 / nagios-3.2.3
Vendor URL: http://www.nagios.org
Vendor Status: fixed
CVE-ID: 2011-1523
OSVDB-ID: 71059
 
======================
Vulnerability Description:
======================
 
This is a Cross-Site Scripting vulnerability
 
JavaScript can be included in style sheets by using "expression()" (IE only)
 
==============
Technical Details:
==============
 

 

Continue reading "SSCHADV2011-002 - Cross-Site Scripting vulnerability in Nagios"

SSCHADV2011-001 - Cross-Site Scripting vulnerabilities in Icinga

            
Advisory: 
Cross-Site Scripting vulnerabilities in Icinga
Advisory ID: 
SSCHADV2011-001
Author: 
Stefan Schurtz
Affected Software: Successfully tested on icinga-1.3.0 / icinga-1.2.1
Vendor URL: http://www.icinga.org
Vendor Status:
fixed csv export link to make it XSS save (IE) #1275
OSVDB-ID: 71050

======================
Vulnerability Description:
======================

This is Cross-Site Scripting vulnerability

==============
Technical Details:
==============
 
Continue reading "SSCHADV2011-001 - Cross-Site Scripting vulnerabilities in Icinga"

Shellscript - Nagios Plugins - UCARP



 
UCARP-Master
 
#!/bin/sh

virtuelle_ip=192.168.0.1
interface=eth1:1

/sbin/ifconfig $interface | grep $virtuelle_ip &> /dev/null

        if [ $? = 1 ]; then
                echo "CRITICAL – Virtual IP $ip on master"
                exit 1
        else
                /sbin/ifconfig $interface | grep $virtuelle_ip | cut -f 2 -d ":" | while read output;
        do
                ip=$(echo $output | awk ‘{print $1}’ )
                echo "OK – Virtual IP on master"
                exit 0
        done
fi
 
UCARP-Slave
 
#!/bin/sh

virtuelle_ip=192.168.0.1
interface=eth1:1

/sbin/ifconfig $interface | grep $virtuelle_ip &> /dev/null

        if [ $? = 1 ]; then
                echo "OK – No Virtual IP on slave"
                exit 0
        else
                /sbin/ifconfig $interface | grep $virtuelle_ip | cut -f 2 -d ":" | while read output;
        do
                ip=$(echo $output | awk ‘{print $1}’ )
                echo "CRITICAL – Virtual IP $ip on slave"
                exit 1
        done
fi


Shellscript - Nagios Plugins - Swap & Memory


 
Plugin zum Überwachen des Arbeitsspeichers
 
#!/bin/sh

free -m | grep Mem | while read output;
do
  mem=$(echo $output | awk ‘{print $2}’ )
  used=$(echo $output | awk ‘{ print $3 }’ )
  free=$(echo $output | awk ‘{ print $4 }’ )
  use=`expr $used \* 100 / $mem`

  if [ $use -ge 90 ]; then
    echo "CRITICAL Total Mem: \"$mem\" Used: \"$used ($use%)\" Free: \"$free\" "
    exit 2
  elif [ $usep -ge 50 ]; then
    echo "WARNING Total Mem: \"$mem\" Used: \"$used ($use%)\" Free: \"$free\" "
    exit 1
  else
    echo "OK Mem: $mem" "Used: $used" "Free: $free"
    exit 0
  fi

done
 
Plugin zum Überwachen des Swap
 
#!/bin/sh
free -m | grep Swap | while read output;
do
  swap=$(echo $output | awk ‘{print $2}’ )
  used=$(echo $output | awk ‘{ print $3 }’ )
  free=$(echo $output | awk ‘{ print $4 }’ )
  use=`expr $used \* 100 / $swap`

  if [ $use -ge 90 ]; then
    echo "CRITICAL Swap: \"$swap\" Used: \"$used ($use%)\" Free: \"$free\" "
    exit 2
  elif [ $use -ge 50 ]; then
    echo "WARNING Swap: \"$swap\" Used: \"$used ($use%)\" Free: \"$free\" "
    exit 1
  else
    echo "OK Swap: $swap" "Used: $used" "Free: $free"
    exit 0
  fi

done
 

Download: memory.sh swap.sh
Imprint | Contact | Privacy Statement

Warning: opendir(/var/www/html/web1/serendipity/plugins/serendipity_event_dpsyntaxhighlighter/sh/3.0.83.2/scripts/): failed to open dir: No such file or directory in /var/www/html/web1/serendipity/plugins/serendipity_event_dpsyntaxhighlighter/serendipity_event_dpsyntaxhighlighter.php on line 26

Warning: Invalid argument supplied for foreach() in /var/www/html/web1/serendipity/plugins/serendipity_event_dpsyntaxhighlighter/serendipity_event_dpsyntaxhighlighter.php on line 170