Vulnerability Name:

CVE-2014-6262 (CCN-99177)

Assigned:2014-12-05
Published:2014-12-05
Updated:2022-01-01
Summary:Multiple format string vulnerabilities in the python module in RRDtool, as used in Zenoss Core before 4.2.5 and other products, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted third argument to the rrdtool.graph function, aka ZEN-15415, a related issue to CVE-2013-2131.
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
4.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:W/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
4.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:W/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-134
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2014-6262

Source: CCN
Type: US-CERT VU#449452
Zenoss Core contains multiple vulnerabilities

Source: MISC
Type: Third Party Advisory, US Government Resource
http://www.kb.cert.org/vuls/id/449452

Source: CCN
Type: BID-71540
Zenoss Core CVE-2014-6262 Denial of Service Vulnerability

Source: CCN
Type: Zenoss Web site
Zenoss

Source: MISC
Type: Third Party Advisory
https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing

Source: XF
Type: UNKNOWN
zenoss-cve20146262-dos(99177)

Source: MISC
Type: Patch, Third Party Advisory
https://github.com/oetiker/rrdtool-1.x/commit/64ed5314af1255ab6dded45f70b39cdeab5ae2ec

Source: MISC
Type: Patch, Third Party Advisory
https://github.com/oetiker/rrdtool-1.x/commit/85261a013112e278c90224033f5b0592ee387786

Source: MISC
Type: Third Party Advisory
https://github.com/oetiker/rrdtool-1.x/pull/532

Source: MLIST
Type: Mailing List, Third Party Advisory
[debian-lts-announce] 20200301 [SECURITY] [DLA 2131-1] rrdtool security update

Source: MLIST
Type: Mailing List, Third Party Advisory
[debian-lts-announce] 20200302 [SECURITY] [DLA 2131-2] rrdtool regression update

Source: MISC
Type: Third Party Advisory, VDB Entry
https://www.securityfocus.com/bid/71540

Vulnerable Configuration:Configuration 1:
  • cpe:/a:zenoss:zenoss_core:*:*:*:*:*:*:*:* (Version < 4.2.5)

  • Configuration 2:
  • cpe:/o:debian:debian_linux:8.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    zenoss zenoss core *
    debian debian linux 8.0