ID CVE-2012-3418
Summary libpcp in Performance Co-Pilot (PCP) before 3.6.5 allows remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a PDU with the numcreds field value greater than the number of actual elements to the __pmDecodeCreds function in p_creds.c; (2) the string byte number value to the __pmDecodeNameList function in p_pmns.c; (3) the numids value to the __pmDecodeIDList function in p_pmns.c; (4) unspecified vectors to the __pmDecodeProfile function in p_profile.c; the (5) status number value or (6) string number value to the __pmDecodeNameList function in p_pmns.c; (7) certain input to the __pmDecodeResult function in p_result.c; (8) the name length field (namelen) to the DecodeNameReq function in p_pmns.c; (9) a crafted PDU_FETCH request to the __pmDecodeFetch function in p_fetch.c; (10) the namelen field in the __pmDecodeInstanceReq function in p_instance.c; (11) the buflen field to the __pmDecodeText function in p_text.c; (12) PDU_INSTANCE packets to the __pmDecodeInstance in p_instance.c; or the (13) c_numpmid or (14) v_numval fields to the __pmDecodeLogControl function in p_lcontrol.c, which triggers integer overflows, heap-based buffer overflows, and/or buffer over-reads.
References
Vulnerable Configurations
  • cpe:2.3:a:sgi:performance_co-pilot:2.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:sgi:performance_co-pilot:2.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:sgi:performance_co-pilot:2.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:sgi:performance_co-pilot:2.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:sgi:performance_co-pilot:2.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:sgi:performance_co-pilot:2.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:sgi:performance_co-pilot:2.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:sgi:performance_co-pilot:2.1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:sgi:performance_co-pilot:2.1.5:*:*:*:*:*:*:*
    cpe:2.3:a:sgi:performance_co-pilot:2.1.5:*:*:*:*:*:*:*
  • cpe:2.3:a:sgi:performance_co-pilot:2.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:sgi:performance_co-pilot:2.1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:sgi:performance_co-pilot:2.1.7:*:*:*:*:*:*:*
    cpe:2.3:a:sgi:performance_co-pilot:2.1.7:*:*:*:*:*:*:*
  • cpe:2.3:a:sgi:performance_co-pilot:2.1.8:*:*:*:*:*:*:*
    cpe:2.3:a:sgi:performance_co-pilot:2.1.8:*:*:*:*:*:*:*
  • cpe:2.3:a:sgi:performance_co-pilot:2.1.9:*:*:*:*:*:*:*
    cpe:2.3:a:sgi:performance_co-pilot:2.1.9:*:*:*:*:*:*:*
  • cpe:2.3:a:sgi:performance_co-pilot:2.1.10:*:*:*:*:*:*:*
    cpe:2.3:a:sgi:performance_co-pilot:2.1.10:*:*:*:*:*:*:*
  • cpe:2.3:a:sgi:performance_co-pilot:2.1.11:*:*:*:*:*:*:*
    cpe:2.3:a:sgi:performance_co-pilot:2.1.11:*:*:*:*:*:*:*
  • cpe:2.3:a:sgi:performance_co-pilot:2.2:*:*:*:*:*:*:*
    cpe:2.3:a:sgi:performance_co-pilot:2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:sgi:performance_co-pilot:-:*:*:*:*:*:*:*
    cpe:2.3:a:sgi:performance_co-pilot:-:*:*:*:*:*:*:*
  • cpe:2.3:a:sgi:performance_co-pilot:3.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:sgi:performance_co-pilot:3.6.4:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 08-10-2013 - 19:24)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
confirm
debian DSA-2533
fedora
  • FEDORA-2012-12024
  • FEDORA-2012-12076
misc
mlist [oss-security] 20120816 pcp: Multiple security flaws
suse
  • SUSE-SU-2013:0190
  • openSUSE-SU-2012:1036
  • openSUSE-SU-2012:1079
  • openSUSE-SU-2012:1081
Last major update 08-10-2013 - 19:24
Published 27-08-2012 - 23:55
Last modified 08-10-2013 - 19:24
Back to Top