This script is Copyright (C) 2005-2013 Tenable Network Security, Inc.
The remote web server may allow arbitrary code execution.
The remote host is running Hobbit Monitor, an open source tool for
monitoring servers, applications, and networks.
The installed version of Hobbit contains a flaw that could lead to the
Hobbit daemon, 'hobbitd', crashing when it tries to process certain
types of messages. It may also be possible to exploit this flaw in
order to run arbitrary code with the privileges of the hobbit user.
See also :
Upgrade to Hobbit version 4.1.0 or later.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.4
Public Exploit Available : false
Family: Gain a shell remotely
Nessus Plugin ID: 19307 (hobbit_dos.nasl)
Bugtraq ID: 14365
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.