First published: Fri Aug 19 2016(Updated: )
Heap-based buffer overflow in the parse_packet function in network.c in collectd before 5.4.3 and 5.x before 5.5.2 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted network packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian | =8.0 | |
collectd | >=5.4.0<5.4.3 | |
collectd | >=5.5.0<5.5.2 | |
Fedora | =23 | |
Fedora | =24 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6254 has a high severity rating due to the potential for denial of service or arbitrary code execution.
To fix CVE-2016-6254, upgrade to Collectd version 5.4.3 or later, or 5.5.2 or later.
CVE-2016-6254 affects Collectd versions prior to 5.4.3 and 5.5.2, as well as specific Debian and Fedora releases.
Yes, CVE-2016-6254 can be exploited remotely through crafted network packets.
The potential impacts of CVE-2016-6254 include crashing the daemon and possibly executing arbitrary code.