Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Pine.GSO.4.51.0901202108550.22454@faron.mitre.org>
Date: Tue, 20 Jan 2009 21:13:26 -0500 (EST)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: OSS Security <oss-security@...ts.openwall.com>
Subject: Re: CVE request - ganglia


Notice the second CVE for the bandwidth/CPU consumption.  The attack
scenario isn't completely clear to me, but since it's labeled as a DoS by
the developer, I decided to include it.

- Steve


======================================================
Name: CVE-2009-0241
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0241
Reference: MLIST:[Ganglia-developers] 20090113 patches for: [Sec] Gmetad server BoF and network overload + [Feature] multiple requests per conn on interactive port
Reference: URL:http://www.mail-archive.com/ganglia-developers@lists.sourceforge.net/msg04929.html
Reference: MISC:http://bugzilla.ganglia.info/cgi-bin/bugzilla/show_bug.cgi?id=223
Reference: BID:33299
Reference: URL:http://www.securityfocus.com/bid/33299
Reference: SECUNIA:33506
Reference: URL:http://secunia.com/advisories/33506

Stack-based buffer overflow in the process_path function in
gmetad/server.c in Ganglia 3.1.1 allows remote attackers to cause a
denial of service (crash) via a request to the gmetad service with a
long pathname.


======================================================
Name: CVE-2009-0242
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0242
Reference: MLIST:[Ganglia-developers] 20090113 patches for: [Sec] Gmetad server BoF and network overload + [Feature] multiple requests per conn on interactive port
Reference: URL:http://www.mail-archive.com/ganglia-developers@lists.sourceforge.net/msg04929.html

Ganglia 3.1.1 allows remote attackers to cause a denial of service via
a request to the gmetad service with a path does not exist, which
causes Ganglia to (1) perform excessive CPU computation and (2) send
the entire tree, which consumes network bandwidth.


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.