- Home
- CVEs with nessus.description==Markus Krell discovered that Xymon (formerly known as Hobbit), a network- and applications-monitoring system, was vulnerable to the following security issues :
CVE-2016-2054
The incorrect handling of user-supplied input in the 'config' command can trigger a stack-based buffer overflow, resulting in denial of service (via application crash) or remote code execution.
CVE-2016-2055
The incorrect handling of user-supplied input in the 'config' command can lead to an information leak by serving sensitive configuration files to a remote user.
CVE-2016-2056
The commands handling password management do not properly validate user-supplied input, and are thus vulnerable to shell command injection by a remote user.
CVE-2016-2058
Incorrect escaping of user-supplied input in status webpages can be used to trigger reflected cross-site scripting attacks.
For Debian 7 'Wheezy', these problems have been fixed in version 4.3.0~beta2.dfsg-9.1+deb7u1.
We recommend that you upgrade your xymon packages.
NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top