First published: Thu Jun 07 2007(Updated: )
<a href="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3112">http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3112</a> "Cacti 0.8.6i, and possibly other versions, allows remote authenticated users to cause a denial of service (CPU consumption) via a large value of the (1) graph_start or (2) graph_end parameter." <a href="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3113">http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3113</a> "Cacti 0.8.6i, and possibly other versions, allows remote authenticated users to cause a denial of service (CPU consumption) via a large value of the (1) graph_height or (2) graph_width parameter." The patch linked to in the reports applies to 0.8.6j too.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/0.8.6j | <8. | 8. |
Cacti | <=0.8.6i |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-3113 has a high severity due to its potential to cause denial of service by consuming excessive CPU resources.
To fix CVE-2007-3113, upgrade Cacti to version 0.8.6j or later.
CVE-2007-3113 affects Cacti version 0.8.6i and possibly earlier versions.
No, CVE-2007-3113 can only be exploited by remote authenticated users.
An attack exploiting CVE-2007-3113 can lead to significant CPU consumption, resulting in a denial of service.