Upstream information

CVE-2009-0241 at MITRE

Description

Stack-based buffer overflow in the process_path function in gmetad/server.c in Ganglia 3.1.1 allows remote attackers to cause a denial of service (crash) via a request to the gmetad service with a long pathname.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 7.5
Vector AV:N/AC:L/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
SUSE Bugzilla entry: 484338 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
openSUSE 11.0
  • ganglia-monitor-core-debuginfo >= 2.5.7-162.2
  • ganglia-monitor-core-debugsource >= 2.5.7-162.2
openSUSE 11.0
  • ganglia-monitor-core >= 2.5.7-162.2
  • ganglia-monitor-core-devel >= 2.5.7-162.2
  • ganglia-monitor-core-gmetad >= 2.5.7-162.2
  • ganglia-monitor-core-gmond >= 2.5.7-162.2
  • ganglia-webfrontend >= 2.5.7-162.2
openSUSE 11.1
  • ganglia-monitor-core-debuginfo >= 2.5.7-172.40.1
  • ganglia-monitor-core-debugsource >= 2.5.7-172.40.1
openSUSE 11.1
  • ganglia-monitor-core >= 2.5.7-172.40.1
  • ganglia-monitor-core-devel >= 2.5.7-172.40.1
  • ganglia-monitor-core-gmetad >= 2.5.7-172.40.1
  • ganglia-monitor-core-gmond >= 2.5.7-172.40.1
  • ganglia-webfrontend >= 2.5.7-172.40.1