First published: Mon Nov 30 2009(Updated: )
Cacti 0.8.7e and earlier allows remote authenticated administrators to gain privileges by modifying the "Data Input Method" for the "Linux - Get Memory Usage" setting to contain arbitrary commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/cacti | 1.2.16+ds1-2+deb11u3 1.2.24+ds1-1+deb12u2 1.2.27+ds1-2 | |
Cacti | <=0.8.7e | |
Cacti | =0.6.7 | |
Cacti | =0.8 | |
Cacti | =0.8.1 | |
Cacti | =0.8.2 | |
Cacti | =0.8.2a | |
Cacti | =0.8.3 | |
Cacti | =0.8.3a | |
Cacti | =0.8.4 | |
Cacti | =0.8.5 | |
Cacti | =0.8.5a | |
Cacti | =0.8.6c | |
Cacti | =0.8.6f | |
Cacti | =0.8.6i | |
Cacti | =0.8.7 | |
Cacti | =0.8.7a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4112 has a high severity rating due to its potential for remote authenticated administrators to escalate privileges.
To fix CVE-2009-4112, upgrade to Cacti version 0.8.8 or later.
CVE-2009-4112 affects Cacti versions 0.8.7e and earlier.
Yes, CVE-2009-4112 can be exploited remotely by authenticated administrators.
CVE-2009-4112 is a privilege escalation vulnerability.