7.5
CVSSv2

CVE-2009-0241

Published: 21/01/2009 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in the process_path function in gmetad/server.c in Ganglia 3.1.1 allows remote malicious users to cause a denial of service (crash) via a request to the gmetad service with a long pathname.

Vulnerable Product Search on Vulmon Subscribe to Product

ganglia ganglia 3.1.1

Vendor Advisories

Spike Spiegel discovered a stack-based buffer overflow in gmetad, the meta-daemon for the ganglia cluster monitoring toolkit, which could be triggered via a request with long path names and might enable arbitrary code execution For the stable distribution (etch), this problem has been fixed in version 257-31etch1 For the unstable distribution ...

Exploits

source: wwwsecurityfocuscom/bid/33299/info Ganglia is prone to a remote stack-based buffer-overflow vulnerability because the software fails to perform adequate boundary checks on user-supplied input Attackers can leverage this issue to execute arbitrary code in the context of the application Successful exploits will compromise the app ...