|
|||
Rule General Information |
---|
Release Date: | 2019-11-29 | |
Rule Name: | Xymon useradm Command Execution Vulnerability (CVE-2016-2056) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | xymond in Xymon 4.1.x, 4.2.x, and 4.3.x before 4.3.25 allow remote authenticated users to execute arbitrary commands via shell metacharacters in the adduser_name argument in (1) web/useradm.c or (2) web/chpasswd.c. | |
Impact: | An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows, Linux, Others | |
Reference: | http://packetstormsecurity.com/files/135758/Xymon-4.3.x-Buffer-Overflow-Code-Execution-Information-Disclosure.html http://packetstormsecurity.com/files/153620/Xymon-useradm-Command-Execution.html http://www.debian.org/security/2016/dsa-3495 http://www.securityfocus.com/archive/1/537522/100/0/threaded |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: http://lists.xymon.com/archive/2016-February/042986.html |