Lucene search

K
gentooGentoo FoundationGLSA-200903-22
HistoryMar 10, 2009 - 12:00 a.m.

Ganglia: Execution of arbitrary code

2009-03-1000:00:00
Gentoo Foundation
security.gentoo.org
18

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.716

Percentile

98.1%

Background

Ganglia is a scalable distributed monitoring system for clusters and grids.

Description

Spike Spiegel reported a stack-based buffer overflow in the process_path() function when processing overly long pathnames in gmetad/server.c.

Impact

A remote attacker could send a specially crafted request to the gmetad service leading to the execution of arbitrary code or a Denial of Service.

Workaround

There is no known workaround at this time.

Resolution

All Ganglia users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=sys-cluster/ganglia-3.1.1-r2"
OSVersionArchitecturePackageVersionFilename
Gentooanyallsys-cluster/ganglia< 3.1.1-r2UNKNOWN

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.716

Percentile

98.1%