Executive Summary
Summary | |
---|---|
Title | Zenoss Core contains multiple vulnerabilities |
Informations | |||
---|---|---|---|
Name | VU#449452 | First vendor Publication | 2014-12-05 |
Vendor | VU-CERT | Last vendor Modification | 2014-12-08 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#449452Zenoss Core contains multiple vulnerabilitiesOverviewThe Zenoss Core application, server, and network management platform software contains multiple vulnerabilities, the most severe of which could allow a remote attacker to execute arbitrary code. Description
Impact
Solution
Vendor Information (Learn More)
CVSS Metrics (Learn More)
References
CreditThanks to Ryan Koppenhaver and Andy Schmitz of Matasano Security for reporting these vulnerabilities. This document was written by Garret Wassermann. Other Information
FeedbackIf you have feedback, comments, or additional information about this vulnerability, please send us email. |
Original Source
Url : http://www.kb.cert.org/vuls/id/449452 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
24 % | CWE-200 | Information Exposure |
18 % | CWE-264 | Permissions, Privileges, and Access Controls |
12 % | CWE-399 | Resource Management Errors |
12 % | CWE-352 | Cross-Site Request Forgery (CSRF) (CWE/SANS Top 25) |
12 % | CWE-255 | Credentials Management |
6 % | CWE-134 | Uncontrolled Format String (CWE/SANS Top 25) |
6 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
6 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
6 % | CWE-77 | Improper Sanitization of Special Elements used in a Command ('Command Injection') |
CPE : Common Platform Enumeration
Snort® IPS/IDS
Date | Description |
---|---|
2017-08-23 | Zenoss call home remote code execution attempt RuleID : 43634 - Revision : 2 - Type : SERVER-WEBAPP |
Alert History
Date | Informations |
---|---|
2014-12-16 17:32:14 |
|
2014-12-15 21:28:29 |
|
2014-12-08 17:23:11 |
|
2014-12-05 21:25:28 |
|