Ganglia Web Backend < 3.0.7 process_path Function Overflow
High Nessus Network Monitor Plugin ID 4816
SynopsisThe remote host is vulnerable to a buffer overflow.
DescriptionThe remote host is running the Ganglia Web Backend (gmetad). This version of Ganglia is vulnerable to a remote buffer overflow within the process_path() function. An attacker exploiting this flaw would need the ability to send malformed data to the Ganglia gmetad process. Successful exploitation would result in the attacker gaining control of the remote system.
SolutionUpgrade to version 3.0.7 or higher.