Vulnerability Description
xymond/xymond.c in xymond in Xymon 4.1.x, 4.2.x, and 4.3.x before 4.3.25 allow remote attackers to read arbitrary files in the configuration directory via a "config" command.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xymon | Xymon | 4.1.0 |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/135758/Xymon-4.3.x-Buffer-Overflow-Code-Exe
- http://www.debian.org/security/2016/dsa-3495
- http://www.securityfocus.com/archive/1/537522/100/0/threaded
- https://sourceforge.net/p/xymon/code/7890/Patch
- http://packetstormsecurity.com/files/135758/Xymon-4.3.x-Buffer-Overflow-Code-Exe
- http://www.debian.org/security/2016/dsa-3495
- http://www.securityfocus.com/archive/1/537522/100/0/threaded
- https://sourceforge.net/p/xymon/code/7890/Patch
FAQ
What is CVE-2016-2055?
CVE-2016-2055 is a vulnerability with a CVSS score of 7.5 (HIGH). xymond/xymond.c in xymond in Xymon 4.1.x, 4.2.x, and 4.3.x before 4.3.25 allow remote attackers to read arbitrary files in the configuration directory via a "config" command.
How severe is CVE-2016-2055?
CVE-2016-2055 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-2055?
Check the references section above for vendor advisories and patch information. Affected products include: Xymon Xymon, Debian Debian Linux.