Stack-based buffer overflow in the process_path function in gmetad/server.c in Ganglia 3.1.1 allows remote attackers to cause a denial of service (crash) via a request to the gmetad service with a long pathname.
References
Configurations
History
21 Nov 2024, 00:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugzilla.ganglia.info/cgi-bin/bugzilla/show_bug.cgi?id=223 - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html - | |
References | () http://secunia.com/advisories/33506 - Vendor Advisory | |
References | () http://secunia.com/advisories/34228 - | |
References | () http://secunia.com/advisories/35416 - | |
References | () http://security.gentoo.org/glsa/glsa-200903-22.xml - | |
References | () http://www.mail-archive.com/ganglia-developers%40lists.sourceforge.net/msg04929.html - | |
References | () http://www.securityfocus.com/bid/33299 - |
07 Nov 2023, 02:03
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2009-01-21 11:30
Updated : 2024-11-21 00:59
NVD link : CVE-2009-0241
Mitre link : CVE-2009-0241
CVE.ORG link : CVE-2009-0241
JSON object : View
Products Affected
ganglia
- ganglia
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer