6.4
CVSSv2

CVE-2016-6254

Published: 19/08/2016 Updated: 07/11/2023
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 9.1 | Impact Score: 5.2 | Exploitability Score: 3.9
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P

Vulnerability Summary

Heap-based buffer overflow in the parse_packet function in network.c in collectd prior to 5.4.3 and 5.x prior to 5.5.2 allows remote malicious users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted network packet.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

debian debian linux 8.0

collectd collectd

fedoraproject fedora 24

fedoraproject fedora 23

Vendor Advisories

Debian Bug report logs - #832507 Heap overflow in the network plugin (CVE-2016-6254) Package: collectd; Maintainer for collectd is Sebastian Harl <tokkee@debianorg>; Source for collectd is src:collectd (PTS, buildd, popcon) Reported by: Florian Forster <octo@collectdorg> Date: Tue, 26 Jul 2016 08:51:02 UTC Severit ...
Emilien Gaspar discovered that collectd, a statistics collection and monitoring daemon, incorrectly processed incoming network packets This resulted in a heap overflow, allowing a remote attacker to either cause a DoS via application crash, or potentially execute arbitrary code Additionally, security researchers at Columbia University and the Uni ...
A heap-based buffer overflow in the parse_packet function in networkc in collectd allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted network packet ...