Vulnerability Description
Multiple buffer overflows in xymond/xymond.c in xymond in Xymon 4.1.x, 4.2.x, and 4.3.x before 4.3.25 allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a long filename, involving handling a "config" command.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Debian | Debian Linux | 8.0 |
| Xymon | Xymon | 4.1.0 |
Related Weaknesses (CWE)
References
- http://lists.xymon.com/archive/2016-February/042986.htmlVendor Advisory
- http://packetstormsecurity.com/files/135758/Xymon-4.3.x-Buffer-Overflow-Code-Exe
- http://www.debian.org/security/2016/dsa-3495
- http://www.securityfocus.com/archive/1/537522/100/0/threaded
- https://sourceforge.net/p/xymon/code/7859/Patch
- https://sourceforge.net/p/xymon/code/7860/Patch
- http://lists.xymon.com/archive/2016-February/042986.htmlVendor Advisory
- http://packetstormsecurity.com/files/135758/Xymon-4.3.x-Buffer-Overflow-Code-Exe
- http://www.debian.org/security/2016/dsa-3495
- http://www.securityfocus.com/archive/1/537522/100/0/threaded
- https://sourceforge.net/p/xymon/code/7859/Patch
- https://sourceforge.net/p/xymon/code/7860/Patch
FAQ
What is CVE-2016-2054?
CVE-2016-2054 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Multiple buffer overflows in xymond/xymond.c in xymond in Xymon 4.1.x, 4.2.x, and 4.3.x before 4.3.25 allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a...
How severe is CVE-2016-2054?
CVE-2016-2054 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2016-2054?
Check the references section above for vendor advisories and patch information. Affected products include: Debian Debian Linux, Xymon Xymon.