7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
6.8 Medium
AI Score
Confidence
Low
0.731 High
EPSS
Percentile
98.1%
Stack-based buffer overflow in the process_path function in gmetad/server.c in Ganglia 3.1.1 allows remote attackers to cause a denial of service (crash) via a request to the gmetad service with a long pathname.
CPE | Name | Operator | Version |
---|---|---|---|
ganglia:ganglia | ganglia | eq | 3.1.1 |
bugzilla.ganglia.info/cgi-bin/bugzilla/show_bug.cgi?id=223
lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html
secunia.com/advisories/33506
secunia.com/advisories/34228
secunia.com/advisories/35416
security.gentoo.org/glsa/glsa-200903-22.xml
www.mail-archive.com/ganglia-developers%40lists.sourceforge.net/msg04929.html
www.securityfocus.com/bid/33299