First published: Tue Mar 31 2009(Updated: )
Buffer overflow in CMAN - The Cluster Manager before 2.03.09-1 on Fedora 9 and Red Hat Enterprise Linux (RHEL) 5 allows attackers to cause a denial of service (CPU consumption and memory corruption) via a cluster.conf file with many lines. NOTE: it is not clear whether this issue crosses privilege boundaries in realistic uses of the product.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Cluster Manager (CMAN) | <=2.03.08-1 | |
Red Hat Cluster Manager (CMAN) | =2.03.03-1 | |
Red Hat Cluster Manager (CMAN) | =2.03.04-1 | |
Red Hat Cluster Manager (CMAN) | =2.03.05-1 | |
Red Hat Cluster Manager (CMAN) | =2.03.07-1 | |
Fedora | =9 | |
Red Hat Linux | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-6560 has a high severity as it can lead to denial of service through CPU consumption and memory corruption.
To fix CVE-2008-6560, upgrade CMAN to version 2.03.09-1 or later.
CVE-2008-6560 affects CMAN versions up to 2.03.08-1 on Fedora 9 and various versions on Red Hat Enterprise Linux 5.
CVE-2008-6560 is a buffer overflow vulnerability that can be exploited by supplying a malicious cluster.conf file.
It is unclear if CVE-2008-6560 can be exploited by non-privileged users, as the privilege level required is not specified.