First published: Tue Jan 27 2009(Updated: )
Format string vulnerability in BMC PATROL Agent before 3.7.30 allows remote attackers to execute arbitrary code via format string specifiers in an invalid version number to TCP port 3181, which are not properly handled when writing a log message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
BMC Patrol Perform Agent | =3.3.00 | |
BMC Patrol Perform Agent | =3.4.11 | |
BMC Patrol Perform Agent | =3.4.11 | |
BMC Patrol Perform Agent | =3.4.00 | |
BMC Patrol Perform Agent | <=3.7 | |
BMC Patrol Perform Agent | =3.2.7 | |
BMC Patrol Perform Agent | =3.4.00 | |
BMC Patrol Perform Agent | =3.4.11 | |
BMC Patrol Perform Agent | =3.3.00 | |
BMC Patrol Perform Agent | =3.2.5 | |
BMC Patrol Perform Agent | =3.3.00 | |
BMC Patrol Perform Agent | =3.2.3 | |
BMC Patrol Perform Agent | =3.4.00 | |
BMC Patrol Perform Agent | =3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5982 is considered to be a high severity vulnerability due to its potential to allow arbitrary code execution.
To fix CVE-2008-5982, update the BMC PATROL Agent to version 3.7.30 or later, which addresses the format string vulnerability.
CVE-2008-5982 is a format string vulnerability that can be exploited through improperly handled log message formats.
CVE-2008-5982 affects BMC PATROL Agent versions up to 3.7, including specific versions like 3.3.00, 3.4.00, 3.4.11, and lower.
Yes, CVE-2008-5982 can be exploited remotely via TCP port 3181 by sending malformed version number requests.