CVE Vulnerabilities

CVE-2013-2131

Use of Externally-Controlled Format String

Published: Jan 04, 2015 | Modified: Apr 12, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
5 N/A
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V3
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

Format string vulnerability in the rrdtool module 1.4.7 for Python, as used in Zenoss, allows context-dependent attackers to cause a denial of service (crash) via format string specifiers to the rrdtool.graph function.

Weakness

The product uses a function that accepts a format string as an argument, but the format string originates from an external source.

Affected Software

NameVendorStart VersionEnd Version
RrdtoolRrdtool_project1.4.7 (including)1.4.7 (including)
RrdtoolUbuntuartful*
RrdtoolUbuntubionic*
RrdtoolUbuntucosmic*
RrdtoolUbuntudevel*
RrdtoolUbuntudisco*
RrdtoolUbuntueoan*
RrdtoolUbuntuesm-infra-legacy/trusty*
RrdtoolUbuntuesm-infra/bionic*
RrdtoolUbuntuesm-infra/focal*
RrdtoolUbuntuesm-infra/xenial*
RrdtoolUbuntufocal*
RrdtoolUbuntugroovy*
RrdtoolUbuntuhirsute*
RrdtoolUbuntuimpish*
RrdtoolUbuntujammy*
RrdtoolUbuntukinetic*
RrdtoolUbuntulucid*
RrdtoolUbuntulunar*
RrdtoolUbuntumantic*
RrdtoolUbuntunoble*
RrdtoolUbuntuoracular*
RrdtoolUbuntuplucky*
RrdtoolUbuntuprecise*
RrdtoolUbuntuprecise/esm*
RrdtoolUbuntuquantal*
RrdtoolUbuntuquesting*
RrdtoolUbunturaring*
RrdtoolUbuntusaucy*
RrdtoolUbuntutrusty*
RrdtoolUbuntutrusty/esm*
RrdtoolUbuntuupstream*
RrdtoolUbuntuutopic*
RrdtoolUbuntuvivid*
RrdtoolUbuntuwily*
RrdtoolUbuntuxenial*
RrdtoolUbuntuyakkety*
RrdtoolUbuntuzesty*

Potential Mitigations

References