Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 255353 - sys-cluster/ganglia remote stack based buffer overflow in gmetad
Summary: sys-cluster/ganglia remote stack based buffer overflow in gmetad
Status: RESOLVED DUPLICATE of bug 255366
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: Current packages (show other bugs)
Hardware: All All
: High critical
Assignee: Gentoo Linux bug wranglers
URL: http://www.securityfocus.com/bid/3329...
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2009-01-18 07:23 UTC by Carlo Marcelo Arenas Belon
Modified: 2009-01-18 22:05 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Carlo Marcelo Arenas Belon 2009-01-18 07:23:57 UTC
all versions of gmetad currently in portage are affected by a buffer overflow when handling requests through the interactive port (8652) and as shown in the linked URL.

upstream is handling this problem through in :

  http://bugzilla.ganglia.info/cgi-bin/bugzilla/show_bug.cgi?id=223

including a proposed patch which will be backported to 3.1 and 3.0 for next release.

Reproducible: Always

Steps to Reproduce:
1. /etc/init.d/gmetad start
2. echo "/`python -c \"print \\"%s/%s\\" % ('a'*300,'b'*300)\"`" |nc localhost 8652
3.

Actual Results:  
gmetad crashes with a corrupted stack which could be used (with a different payload) to execute code remotely.

Expected Results:  
gmetad ignores the invalid request

also tracked in RedHat's bugzilla in :

  https://bugzilla.redhat.com/show_bug.cgi?id=480236
Comment 1 Justin Bronder (RETIRED) gentoo-dev 2009-01-18 22:05:15 UTC
The security team was quick on the uptake.  Marking as a duplicate.  Many thanks for letting us know though!

*** This bug has been marked as a duplicate of bug 255366 ***