- Description
- Buffer overflow in CMAN - The Cluster Manager before 2.03.09-1 on Fedora 9 and Red Hat Enterprise Linux (RHEL) 5 allows attackers to cause a denial of service (CPU consumption and memory corruption) via a cluster.conf file with many lines. NOTE: it is not clear whether this issue crosses privilege boundaries in realistic uses of the product.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 7.8
- Impact score
- 6.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:C
- nvd@nist.gov
- CWE-119
- Hype score
- Not currently trending
- Red HatRed Hat does not consider this to be a security issue. The misbehaviour of CMAN is triggered by corrupted / specially crafted cluster.conf configuration file. Ability to edit this file is restricted to system administrator, therefore no privilege boundary is crossed.
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:cman:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E5280A55-F6CF-4D35-B9D4-A76321EC591A",
"versionEndIncluding": "2.03.08-1"
},
{
"criteria": "cpe:2.3:a:redhat:cman:2.03.03-1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F12B9C5F-29A5-4B40-89E2-CD32477C087F"
},
{
"criteria": "cpe:2.3:a:redhat:cman:2.03.04-1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "06ABB244-870D-4D5F-81FA-0D8D133A1B2D"
},
{
"criteria": "cpe:2.3:a:redhat:cman:2.03.05-1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C31DAF4D-B7BB-43CE-87EC-33062475AF0C"
},
{
"criteria": "cpe:2.3:a:redhat:cman:2.03.07-1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "25AD771F-0B14-4EC9-A425-3E49BE177402"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:fedora:9:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "D32A30CD-EA21-4AA6-868F-3448AA50B70D"
},
{
"criteria": "cpe:2.3:o:redhat:linux:5.0:*:enterprise:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "A00F5B01-0C61-48A6-BE78-1981CA6C09FD"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]