First published: Tue Jun 29 2010(Updated: )
Cacti before 0.8.7f, as used in Red Hat High Performance Computing (HPC) Solution and other products, allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in (1) the FQDN field of a Device or (2) the Vertical Label field of a Graph Template.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cacti | =0.5 | |
Cacti | =0.8.6k | |
Cacti | =0.8.6d | |
Cacti | =0.6.3 | |
Cacti | =0.8.7 | |
Cacti | =0.8.5a | |
Cacti | =0.8.3 | |
Cacti | =0.6.8 | |
Cacti | =0.8.2 | |
Cacti | =0.8.5 | |
Cacti | =0.6.6 | |
Cacti | =0.8.7d | |
Cacti | =0.8.7b | |
Cacti | =0.8.7a | |
Cacti | =0.6.2 | |
Cacti | =0.6.5 | |
Cacti | =0.8.6f | |
Cacti | =0.8.6g | |
Cacti | =0.8.6j | |
Cacti | =0.8.7c | |
Cacti | =0.6.1 | |
Cacti | =0.8 | |
Cacti | =0.8.6a | |
Cacti | =0.8.6i | |
Cacti | =0.8.6 | |
Cacti | =0.6.8a | |
Cacti | =0.6.7 | |
Cacti | =0.8.1 | |
Cacti | =0.8.4 | |
Cacti | =0.8.6c | |
Cacti | =0.6.4 | |
Cacti | =0.8.6b | |
Cacti | =0.8.2a | |
Cacti | =0.8.3a | |
Cacti | =0.8.6h | |
Cacti | <=0.8.7e | |
Cacti | =0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1645 is classified as medium severity due to its potential for remote command execution.
To fix CVE-2010-1645, upgrade to Cacti version 0.8.7f or later.
CVE-2010-1645 affects multiple versions of Cacti, specifically versions prior to 0.8.7f.
Yes, CVE-2010-1645 can be exploited remotely by authenticated administrators.
The input vectors for CVE-2010-1645 are the FQDN field of a Device and the Vertical Label field of a Graph Template.