CVE-2014-6262

Multiple format string vulnerabilities in the python module in RRDtool, as used in Zenoss Core before 4.2.5 and other products, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted third argument to the rrdtool.graph function, aka ZEN-15415, a related issue to CVE-2013-2131.
References
Link Resource
http://www.kb.cert.org/vuls/id/449452 Third Party Advisory US Government Resource
https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing Third Party Advisory
https://github.com/oetiker/rrdtool-1.x/commit/64ed5314af1255ab6dded45f70b39cdeab5ae2ec Patch Third Party Advisory
https://github.com/oetiker/rrdtool-1.x/commit/85261a013112e278c90224033f5b0592ee387786 Patch Third Party Advisory
https://github.com/oetiker/rrdtool-1.x/pull/532 Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/03/msg00000.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/03/msg00003.html Mailing List Third Party Advisory
https://www.securityfocus.com/bid/71540 Third Party Advisory VDB Entry
http://www.kb.cert.org/vuls/id/449452 Third Party Advisory US Government Resource
https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing Third Party Advisory
https://github.com/oetiker/rrdtool-1.x/commit/64ed5314af1255ab6dded45f70b39cdeab5ae2ec Patch Third Party Advisory
https://github.com/oetiker/rrdtool-1.x/commit/85261a013112e278c90224033f5b0592ee387786 Patch Third Party Advisory
https://github.com/oetiker/rrdtool-1.x/pull/532 Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/03/msg00000.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/03/msg00003.html Mailing List Third Party Advisory
https://www.securityfocus.com/bid/71540 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:zenoss:zenoss_core:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:14

Type Values Removed Values Added
References () http://www.kb.cert.org/vuls/id/449452 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/449452 - Third Party Advisory, US Government Resource
References () https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing - Third Party Advisory () https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing - Third Party Advisory
References () https://github.com/oetiker/rrdtool-1.x/commit/64ed5314af1255ab6dded45f70b39cdeab5ae2ec - Patch, Third Party Advisory () https://github.com/oetiker/rrdtool-1.x/commit/64ed5314af1255ab6dded45f70b39cdeab5ae2ec - Patch, Third Party Advisory
References () https://github.com/oetiker/rrdtool-1.x/commit/85261a013112e278c90224033f5b0592ee387786 - Patch, Third Party Advisory () https://github.com/oetiker/rrdtool-1.x/commit/85261a013112e278c90224033f5b0592ee387786 - Patch, Third Party Advisory
References () https://github.com/oetiker/rrdtool-1.x/pull/532 - Third Party Advisory () https://github.com/oetiker/rrdtool-1.x/pull/532 - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2020/03/msg00000.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2020/03/msg00000.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2020/03/msg00003.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2020/03/msg00003.html - Mailing List, Third Party Advisory
References () https://www.securityfocus.com/bid/71540 - Third Party Advisory, VDB Entry () https://www.securityfocus.com/bid/71540 - Third Party Advisory, VDB Entry

Information

Published : 2020-02-12 02:15

Updated : 2024-11-21 02:14


NVD link : CVE-2014-6262

Mitre link : CVE-2014-6262

CVE.ORG link : CVE-2014-6262


JSON object : View

Products Affected

debian

  • debian_linux

zenoss

  • zenoss_core
CWE
CWE-134

Use of Externally-Controlled Format String