ID CVE-2012-3420
Summary Multiple memory leaks in Performance Co-Pilot (PCP) before 3.6.5 allow remote attackers to cause a denial of service (memory consumption or daemon crash) via a large number of PDUs with (1) a crafted context number to the DoFetch function in pmcd/src/dofetch.c or (2) a negative type value to the __pmGetPDU function in libpcp/src/pdu.c.
References
Vulnerable Configurations
  • cpe:2.3:a:sgi:performance_co-pilot:2.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:sgi:performance_co-pilot:2.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:sgi:performance_co-pilot:2.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:sgi:performance_co-pilot:2.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:sgi:performance_co-pilot:2.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:sgi:performance_co-pilot:2.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:sgi:performance_co-pilot:2.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:sgi:performance_co-pilot:2.1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:sgi:performance_co-pilot:2.1.5:*:*:*:*:*:*:*
    cpe:2.3:a:sgi:performance_co-pilot:2.1.5:*:*:*:*:*:*:*
  • cpe:2.3:a:sgi:performance_co-pilot:2.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:sgi:performance_co-pilot:2.1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:sgi:performance_co-pilot:2.1.7:*:*:*:*:*:*:*
    cpe:2.3:a:sgi:performance_co-pilot:2.1.7:*:*:*:*:*:*:*
  • cpe:2.3:a:sgi:performance_co-pilot:2.1.8:*:*:*:*:*:*:*
    cpe:2.3:a:sgi:performance_co-pilot:2.1.8:*:*:*:*:*:*:*
  • cpe:2.3:a:sgi:performance_co-pilot:2.1.9:*:*:*:*:*:*:*
    cpe:2.3:a:sgi:performance_co-pilot:2.1.9:*:*:*:*:*:*:*
  • cpe:2.3:a:sgi:performance_co-pilot:2.1.10:*:*:*:*:*:*:*
    cpe:2.3:a:sgi:performance_co-pilot:2.1.10:*:*:*:*:*:*:*
  • cpe:2.3:a:sgi:performance_co-pilot:2.1.11:*:*:*:*:*:*:*
    cpe:2.3:a:sgi:performance_co-pilot:2.1.11:*:*:*:*:*:*:*
  • cpe:2.3:a:sgi:performance_co-pilot:2.2:*:*:*:*:*:*:*
    cpe:2.3:a:sgi:performance_co-pilot:2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:sgi:performance_co-pilot:-:*:*:*:*:*:*:*
    cpe:2.3:a:sgi:performance_co-pilot:-:*:*:*:*:*:*:*
  • cpe:2.3:a:sgi:performance_co-pilot:3.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:sgi:performance_co-pilot:3.6.4:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 07-02-2013 - 04:57)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
confirm
debian DSA-2533
fedora
  • FEDORA-2012-12024
  • FEDORA-2012-12076
misc
mlist [oss-security] 20120816 pcp: Multiple security flaws
suse
  • SUSE-SU-2013:0190
  • openSUSE-SU-2012:1036
  • openSUSE-SU-2012:1079
  • openSUSE-SU-2012:1081
Last major update 07-02-2013 - 04:57
Published 27-08-2012 - 23:55
Last modified 07-02-2013 - 04:57
Back to Top