Описание
Stack-based buffer overflow in the process_path function in gmetad/server.c in Ganglia 3.1.1 allows remote attackers to cause a denial of service (crash) via a request to the gmetad service with a long pathname.
Релиз | Статус | Примечание |
---|---|---|
dapper | DNE | |
devel | not-affected | |
gutsy | DNE | |
hardy | DNE | |
intrepid | DNE | |
jaunty | DNE | |
karmic | not-affected | 3.1.2-2 |
lucid | not-affected | |
maverick | not-affected | |
natty | not-affected |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | ignored | end of life |
devel | DNE | |
gutsy | ignored | end of life, was needed |
hardy | ignored | end of life |
intrepid | ignored | end of life, was needed |
jaunty | ignored | end of life |
karmic | DNE | |
lucid | DNE | |
maverick | DNE | |
natty | DNE |
Показывать по
Ссылки на источники
7.5 High
CVSS2
Связанные уязвимости
Stack-based buffer overflow in the process_path function in gmetad/server.c in Ganglia 3.1.1 allows remote attackers to cause a denial of service (crash) via a request to the gmetad service with a long pathname.
Stack-based buffer overflow in the process_path function in gmetad/server.c in Ganglia 3.1.1 allows remote attackers to cause a denial of service (crash) via a request to the gmetad service with a long pathname.
Stack-based buffer overflow in the process_path function in gmetad/ser ...
Stack-based buffer overflow in the process_path function in gmetad/server.c in Ganglia 3.1.1 allows remote attackers to cause a denial of service (crash) via a request to the gmetad service with a long pathname.
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
7.5 High
CVSS2