| Vulnerability Name: | CVE-2009-0241 (CCN-48034) | ||||||||||||||||||||
| Assigned: | 2009-01-13 | ||||||||||||||||||||
| Published: | 2009-01-13 | ||||||||||||||||||||
| Updated: | 2009-06-13 | ||||||||||||||||||||
| Summary: | Stack-based buffer overflow in the process_path function in gmetad/server.c in Ganglia 3.1.1 allows remote attackers to cause a denial of service (crash) via a request to the gmetad service with a long pathname. | ||||||||||||||||||||
| CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||
| CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C)
5.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C)
| ||||||||||||||||||||
| Vulnerability Type: | CWE-119 | ||||||||||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||||||||||
| References: | Source: CCN Type: Ganglia Bugzilla Bug 223 Buffer overflow in gmetad Source: MISC Type: UNKNOWN http://bugzilla.ganglia.info/cgi-bin/bugzilla/show_bug.cgi?id=223 Source: MITRE Type: CNA CVE-2009-0241 Source: CCN Type: SourceForge.net Repository Proposed fix for bug 223 from Spike Spiegel Source: SUSE Type: UNKNOWN SUSE-SR:2009:011 Source: CCN Type: SA33506 Ganglia "process_path()" Buffer Overflow Vulnerability Source: SECUNIA Type: Vendor Advisory 33506 Source: SECUNIA Type: UNKNOWN 34228 Source: SECUNIA Type: UNKNOWN 35416 Source: GENTOO Type: UNKNOWN GLSA-200903-22 Source: DEBIAN Type: DSA-1710 ganglia-monitor-core -- buffer overflow Source: CCN Type: GLSA-200903-22 Ganglia: Execution of arbitrary code Source: CCN Type: Ganglia-developers Mailing List, Tue, 13 Jan 2009 07:42:07 -0800 patches for: [Sec] Gmetad server BoF and network overload + [Feature] multiple requests per conn on interactive port Source: MLIST Type: Exploit [Ganglia-developers] 20090113 patches for: [Sec] Gmetad server BoF and network overload + [Feature] multiple requests per conn on interactive port Source: CCN Type: OSVDB ID: 51384 Ganglia gmetad/server.c process_path Function Overflow Source: BID Type: UNKNOWN 33299 Source: CCN Type: BID-33299 Ganglia gmetad 'process_path()' Remote Stack Buffer Overflow Vulnerability Source: XF Type: UNKNOWN ganglia-processpath-bo(48034) Source: SUSE Type: SUSE-SR:2009:011 SUSE Security Summary Report | ||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
| BACK | |||||||||||||||||||||