[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] CVE request - ganglia
From:       Tomas Hoger <thoger () redhat ! com>
Date:       2009-01-26 13:03:00
Message-ID: 20090126140300.23af2b17 () redhat ! com
[Download RAW message or body]

On Tue, 20 Jan 2009 21:13:26 -0500 (EST) "Steven M. Christey"
<coley@linus.mitre.org> wrote:

> Notice the second CVE for the bandwidth/CPU consumption.  The attack
> scenario isn't completely clear to me, but since it's labeled as a
> DoS by the developer, I decided to include it.

CVE-2009-0242 was disputed on the ganglia mailing list, even by the
reporter:
http://www.mail-archive.com/ganglia-developers@lists.sourceforge.net/msg04973.html

The flaw should only apply to gmetad with multi-request feature
proposal included (was part of the original mail, along with the fix
for buffer overflow).  Though from the quick look at the issue,
specifying invalid paths does not seem to make the issue any worse even
there:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-0242#c1

-- 
Tomas Hoger / Red Hat Security Response Team
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic