Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

APP:MISC:GANGLIA-METE-BOF

Severity

High

Recommended

No

Recommended Action

Drop

Category

APP

Keywords

Ganglia Meta Daemon Stack Buffer Overflow

Release Date

2010/09/17

Update Number

1775

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP: Ganglia Meta Daemon Stack Buffer Overflow


This signature detects attempts to exploit a known vulnerability in Ganglia Meta Daemon. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Extended Description

Ganglia is prone to a remote stack-based buffer-overflow vulnerability because the software fails to perform adequate boundary checks on user-supplied input. Attackers can leverage this issue to execute arbitrary code in the context of the application. Successful exploits will compromise the application and the underlying computer. Failed attacks will cause denial-of-service conditions.

Affected Products

  • Debian Linux 4.0
  • Debian Linux 4.0 Alpha
  • Debian Linux 4.0 Amd64
  • Debian Linux 4.0 Arm
  • Debian Linux 4.0 Hppa
  • Debian Linux 4.0 Ia-32
  • Debian Linux 4.0 Ia-64
  • Debian Linux 4.0 M68k
  • Debian Linux 4.0 Mips
  • Debian Linux 4.0 Mipsel
  • Debian Linux 4.0 Powerpc
  • Debian Linux 4.0 S/390
  • Debian Linux 4.0 Sparc
  • Ganglia 2.0.1
  • Ganglia 3.0.0
  • Ganglia 3.0.1
  • Ganglia 3.0.2
  • Ganglia 3.0.3
  • Ganglia 3.0.4
  • Ganglia 3.0.5
  • Ganglia 3.0.6
  • Gentoo Linux
  • SuSE openSUSE 10.3
  • SuSE openSUSE 11.0
  • SuSE openSUSE 11.1

References

  • BugTraq: 33299
  • CVE: CVE-2009-0241

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out