[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-1710-1 ganglia-monitor-core -- buffer overflow

ID: oval:org.secpod.oval:def:600303Date: (C)2011-05-13   (M)2023-11-09
Class: PATCHFamily: unix




Spike Spiegel discovered a stack-based buffer overflow in gmetad, the meta-daemon for the ganglia cluster monitoring toolkit, which could be triggered via a request with long path names and might enable arbitrary code execution. For the stable distribution , this problem has been fixed in version 2.5.7-3.1etch1. For the unstable distribution this problem has been fixed in version 2.5.7-5. For the testing distribution , this problem will be fixed soon. We recommend that you upgrade your ganglia-monitor-core packages.

Platform:
Debian 4.0
Product:
ganglia-monitor-core
Reference:
DSA-1710-1
CVE-2009-0241
CVE    1
CVE-2009-0241
CPE    1
cpe:/o:debian:debian_linux:4.x

© SecPod Technologies