Stack-based buffer overflow in the process_path function in gmetad/server.c in Ganglia 3.1.1 allows remote attackers to cause a denial of service (crash) via a request to the gmetad service with a long pathname.
                
            Metrics
Affected Vendors & Products
Advisories
    | Source | ID | Title | 
|---|---|---|
|  Debian DSA | DSA-1710-1 | New ganglia-monitor-core packages fix remote code execution | 
|  EUVD | EUVD-2009-0249 | Stack-based buffer overflow in the process_path function in gmetad/server.c in Ganglia 3.1.1 allows remote attackers to cause a denial of service (crash) via a request to the gmetad service with a long pathname. | 
Fixes
    Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
        History
                    Wed, 28 May 2025 14:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
Thu, 22 May 2025 04:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T04:24:18.448Z
Reserved: 2009-01-20T00:00:00
Link: CVE-2009-0241
 Vulnrichment
                        Vulnrichment
                    No data.
 NVD
                        NVD
                    Status : Deferred
Published: 2009-01-21T11:30:00.390
Modified: 2025-04-09T00:30:58.490
Link: CVE-2009-0241
 Redhat
                        Redhat
                     OpenCVE Enrichment
                        OpenCVE Enrichment
                    No data.