Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2009-0241

Опубликовано: 13 янв. 2009
Источник: redhat
CVSS2: 5
EPSS Низкий

Описание

Stack-based buffer overflow in the process_path function in gmetad/server.c in Ganglia 3.1.1 allows remote attackers to cause a denial of service (crash) via a request to the gmetad service with a long pathname.

Отчет

Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2009-0241 The Red Hat Product Security has rated this issue as having moderate security impact, a future update of Red Hat HPC Solution may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/

Дополнительная информация

Статус:

Moderate

EPSS

Процентиль: 92%
0.08907
Низкий

5 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 16 лет назад

Stack-based buffer overflow in the process_path function in gmetad/server.c in Ganglia 3.1.1 allows remote attackers to cause a denial of service (crash) via a request to the gmetad service with a long pathname.

nvd
больше 16 лет назад

Stack-based buffer overflow in the process_path function in gmetad/server.c in Ganglia 3.1.1 allows remote attackers to cause a denial of service (crash) via a request to the gmetad service with a long pathname.

debian
больше 16 лет назад

Stack-based buffer overflow in the process_path function in gmetad/ser ...

github
больше 3 лет назад

Stack-based buffer overflow in the process_path function in gmetad/server.c in Ganglia 3.1.1 allows remote attackers to cause a denial of service (crash) via a request to the gmetad service with a long pathname.

fstec
больше 16 лет назад

Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 92%
0.08907
Низкий

5 Medium

CVSS2