First published: Thu Jul 19 2012(Updated: )
Florian Weimer of the Red Hat Product Security Team discovered multiple integer and heap-based buffer overflow flaws in PCP (Performance Co-Pilot) libpcp protocol decoding functions. These flaws could lead to daemon crashes or the execution of arbitrary code with root privileges. Many of these flaws can be exploited without requiring the attacker to be authenticated.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/pcp | <3.6.5 | 3.6.5 |
Performance Co-Pilot | <=3.6.4 | |
Performance Co-Pilot | =2.1.1 | |
Performance Co-Pilot | =2.1.2 | |
Performance Co-Pilot | =2.1.3 | |
Performance Co-Pilot | =2.1.4 | |
Performance Co-Pilot | =2.1.5 | |
Performance Co-Pilot | =2.1.6 | |
Performance Co-Pilot | =2.1.7 | |
Performance Co-Pilot | =2.1.8 | |
Performance Co-Pilot | =2.1.9 | |
Performance Co-Pilot | =2.1.10 | |
Performance Co-Pilot | =2.1.11 | |
Performance Co-Pilot | =2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3418 has a severity rating that indicates it can lead to a denial of service and potentially allows for arbitrary code execution.
To mitigate CVE-2012-3418, upgrade to Performance Co-Pilot version 3.6.5 or later.
CVE-2012-3418 affects Performance Co-Pilot versions prior to 3.6.5, including various 2.x versions.
Yes, CVE-2012-3418 can be exploited by remote attackers to trigger a denial of service.
The common impact of CVE-2012-3418 includes service interruptions and potential unauthorized execution of code.