2.1
CVSSv2

CVE-2016-2057

Published: 13/04/2016 Updated: 09/10/2018
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 3.3 | Impact Score: 1.4 | Exploitability Score: 1.8
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

lib/xymond_ipc.c in Xymon 4.1.x, 4.2.x, and 4.3.x prior to 4.3.25 use weak permissions (666) for an unspecified IPC message queue, which allows local users to inject arbitrary messages by writing to that queue.

Vulnerable Product Search on Vulmon Subscribe to Product

xymon xymon 4.3.24

xymon xymon 4.3.23

xymon xymon 4.3.17

xymon xymon 4.3.16

xymon xymon 4.3.9

xymon xymon 4.3.8

xymon xymon 4.3.0

xymon xymon 4.2.2

xymon xymon 4.1.2

xymon xymon 4.1.1

xymon xymon 4.1.0

xymon xymon 4.3.22

xymon xymon 4.3.21

xymon xymon 4.3.15

xymon xymon 4.3.14

xymon xymon 4.3.7

xymon xymon 4.3.6

xymon xymon 4.2.0

xymon xymon 4.2

xymon xymon 4.3.19

xymon xymon 4.3.18

xymon xymon 4.3.11

xymon xymon 4.3.10

xymon xymon 4.3.2

xymon xymon 4.3.1

xymon xymon 4.2.3

xymon xymon 4.3.20

xymon xymon 4.3.13

xymon xymon 4.3.12

xymon xymon 4.3.5

xymon xymon 4.3.4

xymon xymon 4.3.3

debian debian linux 8.0

Vendor Advisories

Markus Krell discovered that xymon, a network- and applications-monitoring system, was vulnerable to the following security issues: CVE-2016-2054 The incorrect handling of user-supplied input in the config command can trigger a stack-based buffer overflow, resulting in denial of service (via application crash) or remote code execution CVE-2 ...

Exploits

Xymon 43x versions suffers from buffer overflow, information disclosure, code execution, cross site scripting, and various other vulnerabilities ...