Executive Summary
Summary | |
---|---|
Title | Cacti: Multiple vulnerabilities |
Informations | |||
---|---|---|---|
Name | GLSA-201711-10 | First vendor Publication | 2017-11-11 |
Vendor | Gentoo | Last vendor Modification | 2017-11-11 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Synopsis ========
Multiple vulnerabilities have been found in Cacti, the worst of which could lead to the remote execution of arbitrary code.
Background ==========
Cacti is a complete frontend to rrdtool.
Description ===========
Multiple vulnerabilities have been discovered in Cacti. Please review the CVE identifiers referenced below for details.
Impact ======
Remote attackers could execute arbitrary code or bypass intended access restrictions.
Workaround ==========
There is no known workaround at this time.
Resolution ==========
All Cacti users should upgrade to the latest version:
References ==========
[ 1 ] CVE-2014-4000 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4000 [ 2 ] CVE-2016-2313 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2313 [ 3 ] CVE-2017-12065 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-12065
Availability ============
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201711-10
|
Original Source
Url : http://security.gentoo.org/glsa/glsa-201711-10.xml |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-264 | Permissions, Privileges, and Access Controls |
50 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-11-13 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201711-10.nasl - Type : ACT_GATHER_INFO |
2017-08-18 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2017-874.nasl - Type : ACT_GATHER_INFO |
2017-08-10 | Name : The remote Fedora host is missing a security update. File : fedora_2017-127e76d78d.nasl - Type : ACT_GATHER_INFO |
2017-08-08 | Name : The remote Fedora host is missing a security update. File : fedora_2017-6833997d76.nasl - Type : ACT_GATHER_INFO |
2017-08-08 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2017-889.nasl - Type : ACT_GATHER_INFO |
2017-04-21 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2017-817.nasl - Type : ACT_GATHER_INFO |
2017-03-14 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2017-325.nasl - Type : ACT_GATHER_INFO |
2017-03-09 | Name : The remote Fedora host is missing a security update. File : fedora_2017-a513be0939.nasl - Type : ACT_GATHER_INFO |
2017-03-08 | Name : The remote Fedora host is missing a security update. File : fedora_2017-8b0737b093.nasl - Type : ACT_GATHER_INFO |
2016-07-26 | Name : The remote Debian host is missing a security update. File : debian_DLA-560.nasl - Type : ACT_GATHER_INFO |
2016-07-18 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201607-05.nasl - Type : ACT_GATHER_INFO |
2016-03-02 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_db3301bee01c11e5b2bd002590263bf5.nasl - Type : ACT_GATHER_INFO |
2016-02-15 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-198.nasl - Type : ACT_GATHER_INFO |
2016-02-15 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-199.nasl - Type : ACT_GATHER_INFO |
2016-02-15 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-201.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2017-11-15 21:26:51 |
|
2017-11-14 13:24:55 |
|
2017-11-11 21:24:06 |
|