[Bug 319111] [NEW] gmetad: stack based buffer overflow in interactive port

Launchpad Bug Tracker 319111 at bugs.launchpad.net
Tue Jan 20 17:09:32 UTC 2009


*** This bug is a security vulnerability ***

You have been subscribed to a public security bug by Jamie Strandboge (jdstrand):

a buffer overflow has been reported in the interactive port for gmetad
(TCP/8652) which could result in code executed remotely or at least a
DoS by crashing the gmetad daemon with a segfault and as can be seen in
:

  http://bugzilla.ganglia.info/cgi-bin/bugzilla/show_bug.cgi?id=223

more information about this problem has been reported in :

  http://www.securityfocus.com/bid/33299
  http://secunia.com/advisories/33506

a CVE was already requested by the Red Hat security team as shown by :

  http://www.openwall.com/lists/oss-security/2009/01/15/3

** Affects: ganglia-monitor-core (Ubuntu)
     Importance: Undecided
         Status: New

** Affects: ganglia-monitor-core (Debian)
     Importance: Unknown
         Status: Unknown

** Affects: ganglia (Fedora)
     Importance: Unknown
         Status: Unknown

** Affects: ganglia (Gentoo Linux)
     Importance: Unknown
         Status: Confirmed

-- 
gmetad: stack based buffer overflow in interactive port
https://bugs.launchpad.net/bugs/319111
You received this bug notification because you are a member of Ubuntu Bugs, which is a direct subscriber.

-- 
ubuntu-bugs mailing list
ubuntu-bugs at lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs




More information about the universe-bugs mailing list