First published: Sun Apr 22 2007(Updated: )
Stack-based buffer overflow in bgs_sdservice.exe in BMC Patrol PerformAgent allows remote attackers to execute arbitrary code by connecting to TCP port 10128 and sending certain XDR data, which is not properly parsed.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
BMC Patrol Perform Agent |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2136 has a high severity rating due to the potential for remote code execution.
To fix CVE-2007-2136, ensure that you apply the latest patches and updates provided by BMC for the Patrol PerformAgent.
CVE-2007-2136 affects BMC Patrol PerformAgent software versions that are susceptible to stack-based buffer overflow.
To protect your network, restrict access to TCP port 10128 and monitor for any unauthorized connections.
There have been reports of CVE-2007-2136 being actively exploited, highlighting the importance of immediate remediation.