[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3495-1 xymon -- xymon

ID: oval:org.secpod.oval:def:602399Date: (C)2016-03-03   (M)2021-06-02
Class: PATCHFamily: unix




Markus Krell discovered that xymon, a network- and applications-monitoring system, was vulnerable to the following security issues: CVE-2016-2054 The incorrect handling of user-supplied input in the "config" command can trigger a stack-based buffer overflow, resulting in denial of service or remote code execution. CVE-2016-2055 The incorrect handling of user-supplied input in the "config" command can lead to an information leak by serving sensitive configuration files to a remote user. CVE-2016-2056 The commands handling password management do not properly validate user-supplied input, and are thus vulnerable to shell command injection by a remote user. CVE-2016-2057 Incorrect permissions on an internal queuing system allow a user with a local account on the xymon master server to bypass all network-based access control lists, and thus inject messages directly into xymon. CVE-2016-2058 Incorrect escaping of user-supplied input in status webpages can be used to trigger reflected cross-site scripting attacks.

Platform:
Debian 8.x
Product:
xymon
Reference:
DSA-3495-1
CVE-2016-2054
CVE-2016-2055
CVE-2016-2056
CVE-2016-2057
CVE-2016-2058
CVE    5
CVE-2016-2058
CVE-2016-2054
CVE-2016-2055
CVE-2016-2056
...
CPE    2
cpe:/a:xymon:xymon
cpe:/o:debian:debian_linux:8.x

© SecPod Technologies