Upstream information

CVE-2009-4112 at MITRE

Description

Cacti 0.8.7e and earlier allows remote authenticated administrators to gain privileges by modifying the "Data Input Method" for the "Linux - Get Memory Usage" setting to contain arbitrary commands.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 9
Vector AV:N/AC:L/Au:S/C:C/I:C/A:C
Access Vector Network
Access Complexity Low
Authentication Single
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
SUSE Bugzilla entries: 1122535 [RESOLVED / FIXED], 558664 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Package Hub 12
  • cacti >= 1.2.11-5.1
  • cacti-spine >= 1.2.11-2.1
Patchnames:
openSUSE-2020-558
SUSE Package Hub 15 SP1
  • cacti >= 1.2.11-bp151.4.6.1
  • cacti-spine >= 1.2.11-bp151.4.6.1
Patchnames:
openSUSE-2020-284
openSUSE-2020-565
openSUSE Leap 15.1
  • cacti >= 1.2.11-lp151.3.6.1
  • cacti-spine >= 1.2.11-lp151.3.6.1
Patchnames:
openSUSE-2020-272
openSUSE-2020-558
openSUSE Tumbleweed
  • cacti >= 1.2.18-1.2
Patchnames:
openSUSE Tumbleweed GA cacti-1.2.18-1.2


SUSE Timeline for this CVE

CVE page created: Fri Jun 28 07:05:14 2013
CVE page last modified: Fri Dec 8 16:36:21 2023