Summary
Detail | |||
---|---|---|---|
Vendor | Sgi | First view | 2001-12-06 |
Product | Performance Co-Pilot | Last view | 2012-11-29 |
Version | Type | ||
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
2.1 | 2012-11-29 | CVE-2012-5530 | The (1) pcmd and (2) pmlogger init scripts in Performance Co-Pilot (PCP) before 3.6.10 allow local users to overwrite arbitrary files via a symlink attack on a /var/tmp/##### temporary file. |
5 | 2012-08-27 | CVE-2012-3421 | The pduread function in pdu.c in libpcp in Performance Co-Pilot (PCP) before 3.6.5 does not properly time out connections, which allows remote attackers to cause a denial of service (pmcd hang) by sending individual bytes of a PDU separately, related to an "event-driven programming flaw." |
5 | 2012-08-27 | CVE-2012-3420 | Multiple memory leaks in Performance Co-Pilot (PCP) before 3.6.5 allow remote attackers to cause a denial of service (memory consumption or daemon crash) via a large number of PDUs with (1) a crafted context number to the DoFetch function in pmcd/src/dofetch.c or (2) a negative type value to the __pmGetPDU function in libpcp/src/pdu.c. |
5 | 2012-08-27 | CVE-2012-3419 | Performance Co-Pilot (PCP) before 3.6.5 exports some of the /proc file system, which allows attackers to obtain sensitive information such as proc/pid/maps and command line arguments. |
5 | 2012-08-27 | CVE-2012-3418 | libpcp in Performance Co-Pilot (PCP) before 3.6.5 allows remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a PDU with the numcreds field value greater than the number of actual elements to the __pmDecodeCreds function in p_creds.c; (2) the string byte number value to the __pmDecodeNameList function in p_pmns.c; (3) the numids value to the __pmDecodeIDList function in p_pmns.c; (4) unspecified vectors to the __pmDecodeProfile function in p_profile.c; the (5) status number value or (6) string number value to the __pmDecodeNameList function in p_pmns.c; (7) certain input to the __pmDecodeResult function in p_result.c; (8) the name length field (namelen) to the DecodeNameReq function in p_pmns.c; (9) a crafted PDU_FETCH request to the __pmDecodeFetch function in p_fetch.c; (10) the namelen field in the __pmDecodeInstanceReq function in p_instance.c; (11) the buflen field to the __pmDecodeText function in p_text.c; (12) PDU_INSTANCE packets to the __pmDecodeInstance in p_instance.c; or the (13) c_numpmid or (14) v_numval fields to the __pmDecodeLogControl function in p_lcontrol.c, which triggers integer overflows, heap-based buffer overflows, and/or buffer over-reads. |
7.2 | 2001-12-06 | CVE-2001-0823 | The pmpost program in Performance Co-Pilot (PCP) before 2.2.1-3 allows a local user to gain privileges via a symlink attack on the NOTICES file in the PCP log directory (PCP_LOG_DIR). |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
25% (1) | CWE-399 | Resource Management Errors |
25% (1) | CWE-264 | Permissions, Privileges, and Access Controls |
25% (1) | CWE-200 | Information Exposure |
25% (1) | CWE-189 | Numeric Errors |
Oval Markup Language : Definitions
OvalID | Name |
---|---|
oval:org.mitre.oval:def:20165 | DSA-2533-1 pcp - several |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
1870 | Performance Co-Pilot pmpost Symlink Privilege Escalation |
OpenVAS Exploits
id | Description |
---|---|
2012-11-23 | Name : Fedora Update for pcp FEDORA-2012-18654 File : nvt/gb_fedora_2012_18654_pcp_fc16.nasl |
2012-11-23 | Name : Fedora Update for pcp FEDORA-2012-18686 File : nvt/gb_fedora_2012_18686_pcp_fc17.nasl |
2012-11-06 | Name : Fedora Update for pcp FEDORA-2012-17019 File : nvt/gb_fedora_2012_17019_pcp_fc16.nasl |
2012-11-06 | Name : Fedora Update for pcp FEDORA-2012-17050 File : nvt/gb_fedora_2012_17050_pcp_fc17.nasl |
2012-08-30 | Name : Debian Security Advisory DSA 2533-1 (pcp) File : nvt/deb_2533_1.nasl |
2012-08-30 | Name : Fedora Update for pcp FEDORA-2012-12076 File : nvt/gb_fedora_2012_12076_pcp_fc17.nasl |
2012-08-21 | Name : Fedora Update for pcp FEDORA-2012-12024 File : nvt/gb_fedora_2012_12024_pcp_fc16.nasl |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2014-06-13 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2012-525.nasl - Type: ACT_GATHER_INFO |
2014-06-13 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2012-542.nasl - Type: ACT_GATHER_INFO |
2014-06-13 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2012-544.nasl - Type: ACT_GATHER_INFO |
2013-01-25 | Name: The remote SuSE 11 host is missing a security update. File: suse_11_libpcp3-130107.nasl - Type: ACT_GATHER_INFO |
2013-01-24 | Name: The remote SuSE 10 host is missing a security-related patch. File: suse_libpcp3-8421.nasl - Type: ACT_GATHER_INFO |
2012-11-26 | Name: The remote Fedora host is missing a security update. File: fedora_2012-18587.nasl - Type: ACT_GATHER_INFO |
2012-11-23 | Name: The remote Fedora host is missing a security update. File: fedora_2012-18654.nasl - Type: ACT_GATHER_INFO |
2012-11-23 | Name: The remote Fedora host is missing a security update. File: fedora_2012-18686.nasl - Type: ACT_GATHER_INFO |
2012-09-18 | Name: The remote Fedora host is missing a security update. File: fedora_2012-11988.nasl - Type: ACT_GATHER_INFO |
2012-08-24 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-2533.nasl - Type: ACT_GATHER_INFO |
2012-08-21 | Name: The remote Fedora host is missing a security update. File: fedora_2012-12024.nasl - Type: ACT_GATHER_INFO |
2012-08-21 | Name: The remote Fedora host is missing a security update. File: fedora_2012-12076.nasl - Type: ACT_GATHER_INFO |