A security vulnerability has been found in version 4.x of the Xymon Systems & Network Monitor tool The error permits a remote attacker to delete files on the server running the Xymon trend-data daemon “xymond_rrd”. File deletion is done with the privileges of the user that Xymon is running with, so it is limited to files available to the userid running the Xymon service. This includes all historical data stored by the Xymon monitoring system. (CVE-2013-4173)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Mageia | 2 | noarch | xymon | < 4.2.3-11 | xymon-4.2.3-11.mga2 |
Mageia | 3 | noarch | xymon | < 4.2.3-14 | xymon-4.2.3-14.mga3 |