{"id":"CVE-2018-13441","details":"qh_help in Nagios Core version 4.4.1 and earlier is prone to a NULL pointer dereference vulnerability, which allows attacker to cause a local denial-of-service condition by sending a crafted payload to the listening UNIX socket.","modified":"2026-03-20T11:23:02.918373Z","published":"2018-07-12T18:29:00.420Z","related":["MGASA-2019-0104","openSUSE-SU-2020:0500-1","openSUSE-SU-2020:0517-1","openSUSE-SU-2024:11073-1"],"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00022.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00014.html"},{"type":"ADVISORY","url":"https://knowledge.opsview.com/v5.3/docs/whats-new"},{"type":"ADVISORY","url":"https://knowledge.opsview.com/v5.4/docs/whats-new"},{"type":"EVIDENCE","url":"https://gist.github.com/fakhrizulkifli/8df4a174158df69ebd765f824bd736b8"},{"type":"EVIDENCE","url":"https://www.exploit-db.com/exploits/45082/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/nagiosenterprises/nagioscore","events":[{"introduced":"0"},{"last_affected":"345fd4e8257085ce7f3806ee4fb04008919f24e5"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"4.4.1"}]}}],"versions":["4.2.1","autoconf-1.0.0","autoconf-1.0.1","nagios-1.0a6","nagios-1.0a7","nagios-1.0b1","nagios-1.0b2","nagios-1.0b3","nagios-1.0b4","nagios-1.0b5","nagios-1.0b6","nagios-2.0","nagios-2.0.b5","nagios-2.0b1","nagios-2.0b2","nagios-2.0b3","nagios-2.0b4","nagios-2.0b6","nagios-2.0rc1","nagios-3.0","nagios-3.0.1","nagios-3.0.2","nagios-3.0.3","nagios-3.0.4","nagios-3.0.5","nagios-3.0.6","nagios-3.0a1","nagios-3.0a2","nagios-3.0a3","nagios-3.0a4","nagios-3.0a5","nagios-3.0b1","nagios-3.0b2","nagios-3.0b3","nagios-3.0b4","nagios-3.0b5","nagios-3.0b6","nagios-3.0b7","nagios-3.0rc1","nagios-3.0rc2","nagios-3.0rc3","nagios-3.1.0","nagios-3.1.1","nagios-3.1.2","nagios-3.2.0","nagios-3.2.1","nagios-3.2.2","nagios-3.2.3","nagios-3.3.1","nagios-3.4.0","nagios-3.4.1","nagios-4.0.0","nagios-4.0.0-beta1","nagios-4.0.0-beta2","nagios-4.0.0-beta3","nagios-4.0.0-beta4","nagios-4.0.1","nagios-4.0.2","nagios-4.0.2rc1","nagios-4.0.3","nagios-4.0.3rc1","nagios-4.0.4","nagios-4.0.5","nagios-4.0.6","nagios-4.0.7","nagios-4.0.8","nagios-4.0.8rc1","nagios-4.1.0","nagios-4.1.0rc2","nagios-4.1.1","nagios-4.1.2-Pre1","nagios-4.2.0","nagios-4.2.1","nagios-4.2.2","nagios-4.2.3","nagios-4.3.0","nagios-4.3.1","nagios-4.3.2","nagios-4.3.3","nagios-4.3.4","nagios-4.4.0","nagios-4.4.1","release-4.2.3","release-4.2.4","release-4.3.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-13441.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}