CVE-2011-3741

Publication date 23 September 2011

Last updated 24 July 2024


Ubuntu priority

Description

Ganglia 3.1.7 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by host_view.php and certain other files.

Read the notes from the security team

Status

Package Ubuntu Release Status
ganglia 18.04 LTS bionic Ignored
17.10 artful Ignored end of life
17.04 zesty Ignored end of life
16.10 yakkety Ignored end of life
16.04 LTS xenial Ignored
15.10 wily Ignored end of life
15.04 vivid Ignored end of life
14.10 utopic Ignored end of life
14.04 LTS trusty Ignored
13.10 saucy Ignored end of life
13.04 raring Ignored end of life
12.10 quantal Ignored end of life
12.04 LTS precise Ignored end of life
11.10 oneiric Ignored end of life
11.04 natty Ignored end of life
10.10 maverick Ignored end of life
10.04 LTS lucid Ignored end of life
8.04 LTS hardy Not in release

Notes


debian

NOT-FOR-US: Web app path disclosure, not an issue (path is known anyway)


msalvatore

I'm retiring this because the version of ganglia in trusty is 3.6.0-1ubuntu2, vs the affected version of 3.1.7. Additionally, Debian has this labeled as "NOT-FOR-US".