Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 26 Jan 2009 14:03:00 +0100
From: Tomas Hoger <thoger@...hat.com>
To: oss-security@...ts.openwall.com
Cc: coley@...us.mitre.org
Subject: Re: CVE request - ganglia

On Tue, 20 Jan 2009 21:13:26 -0500 (EST) "Steven M. Christey"
<coley@...us.mitre.org> wrote:

> Notice the second CVE for the bandwidth/CPU consumption.  The attack
> scenario isn't completely clear to me, but since it's labeled as a
> DoS by the developer, I decided to include it.

CVE-2009-0242 was disputed on the ganglia mailing list, even by the
reporter:
http://www.mail-archive.com/ganglia-developers@lists.sourceforge.net/msg04973.html

The flaw should only apply to gmetad with multi-request feature
proposal included (was part of the original mail, along with the fix
for buffer overflow).  Though from the quick look at the issue,
specifying invalid paths does not seem to make the issue any worse even
there:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-0242#c1

-- 
Tomas Hoger / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.