Vulnerability Name:

CVE-2007-3112 (CCN-34747)

Assigned:2007-06-06
Published:2007-06-06
Updated:2017-07-29
Summary:graph_image.php in Cacti 0.8.6i, and possibly other versions, allows remote authenticated users to cause a denial of service (CPU consumption) via a large value of the (1) graph_start or (2) graph_end parameter, different vectors than CVE-2007-3113.
The vendor
CVSS v3 Severity:3.5 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:7.8 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
5.8 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
4.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P)
3.0 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: CCN
Type: Full-Disclosure Mailing List, Tue Jun 05 2007 - 18:32:34 CDT
Cacti Denial of Service

Source: FULLDISC
Type: UNKNOWN
20070605 Cacti Denial of Service

Source: CONFIRM
Type: UNKNOWN
http://bugs.cacti.net/view.php?id=955

Source: MITRE
Type: CNA
CVE-2007-3112

Source: MITRE
Type: CNA
CVE-2007-3113

Source: FEDORA
Type: UNKNOWN
FEDORA-2007-2199

Source: MISC
Type: UNKNOWN
http://mdessus.free.fr/?p=15

Source: OSVDB
Type: UNKNOWN
37019

Source: CCN
Type: SA25557
Cacti "graph_image.php" Denial of Service

Source: SECUNIA
Type: Patch, Vendor Advisory
25557

Source: SECUNIA
Type: UNKNOWN
26872

Source: CCN
Type: SourceForge.net
Cacti

Source: CCN
Type: SVN Repository
Diff of /branches/BRANCH_0_8_6/cacti/graph_image.php

Source: CONFIRM
Type: Patch
http://svn.cacti.net/cgi-bin/viewcvs.cgi/branches/BRANCH_0_8_6/cacti/graph_image.php?rev=3956&r1=3898&r2=3956

Source: DEBIAN
Type: DSA-1954
cacti -- insufficient input sanitising

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2007:184

Source: CCN
Type: OSVDB ID: 37019
Cacti graph_image.php Multiple Variable Malformed Input Remote DoS

Source: MISC
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=243592

Source: XF
Type: UNKNOWN
cacti-graphimage-dos(34747)

Source: XF
Type: UNKNOWN
cacti-graphstart-graphend-dos(34747)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:the_cacti_group:cacti:*:*:*:*:*:*:*:* (Version <= 0.8.6i)

  • Configuration CCN 1:
  • cpe:/a:cacti:cacti:0.8.6j:*:*:*:*:*:*:*
  • AND
  • cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20073112
    V
    CVE-2007-3112
    2022-06-30
    oval:org.opensuse.security:def:112039
    P
    cacti-1.2.18-1.2 on GA media (Moderate)
    2022-01-17
    oval:org.opensuse.security:def:105594
    P
    cacti-1.2.18-1.2 on GA media (Moderate)
    2021-10-01
    oval:org.mitre.oval:def:6983
    P
    DSA-1954 cacti -- insufficient input sanitising
    2014-06-23
    oval:org.mitre.oval:def:13514
    P
    DSA-1954-1 cacti -- insufficient input sanitising
    2014-06-23
    oval:org.debian:def:1954
    V
    insufficient input sanitising
    2009-12-16
    BACK
    the_cacti_group cacti *
    cacti cacti 0.8.6j
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    debian debian linux 4.0
    debian debian linux 5.0