Vulnerability Details : CVE-2013-2131
Format string vulnerability in the rrdtool module 1.4.7 for Python, as used in Zenoss, allows context-dependent attackers to cause a denial of service (crash) via format string specifiers to the rrdtool.graph function.
Vulnerability category: OverflowDenial of service
Products affected by CVE-2013-2131
- cpe:2.3:a:rrdtool_project:rrdtool:1.4.7:*:*:*:*:python:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-2131
6.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 94 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-2131
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2013-2131
-
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-2131
-
http://www.openwall.com/lists/oss-security/2013/05/31/2
oss-security - Re: plone, rrdtool, zenoss bugs
-
https://bugzilla.redhat.com/show_bug.cgi?id=969296
969296 – (CVE-2013-2131) CVE-2013-2131 rrdtool: crashes on format string exploit
-
https://github.com/oetiker/rrdtool-1.x/pull/397
Added imginfo format check by yarda · Pull Request #397 · oetiker/rrdtool-1.x · GitHub
-
http://www.openwall.com/lists/oss-security/2013/05/19/5
oss-security - Re: plone, rrdtool, zenoss bugs
-
https://github.com/oetiker/rrdtool-1.x/issues/396
Format string is not checked · Issue #396 · oetiker/rrdtool-1.x · GitHub
-
http://www.openwall.com/lists/oss-security/2013/04/18/5
oss-security - plone, rrdtool, zenoss bugs
Jump to