First published: Thu Jul 19 2012(Updated: )
Florian Weimer of the Red Hat Product Security Team discovered a denial of service flaw in pmcd (the PCP (Performance Co-Pilot) performance metrics collector daemon) due to incorrect event-driven programming. Because the pduread() function in libpcp performs a select locally, waiting for more client data, an unauthenticated remote attacker could send individual bytes one by one, avoiding the timeout, and blocking pmcd in order to prevent it from responding to other legitimate requests.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/pcp | <3.6.5 | 3.6.5 |
Performance Co-Pilot | <=3.6.4 | |
Performance Co-Pilot | =2.1.1 | |
Performance Co-Pilot | =2.1.2 | |
Performance Co-Pilot | =2.1.3 | |
Performance Co-Pilot | =2.1.4 | |
Performance Co-Pilot | =2.1.5 | |
Performance Co-Pilot | =2.1.6 | |
Performance Co-Pilot | =2.1.7 | |
Performance Co-Pilot | =2.1.8 | |
Performance Co-Pilot | =2.1.9 | |
Performance Co-Pilot | =2.1.10 | |
Performance Co-Pilot | =2.1.11 | |
Performance Co-Pilot | =2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3421 is considered a denial of service vulnerability.
To fix CVE-2012-3421, upgrade to Performance Co-Pilot version 3.6.5 or later.
CVE-2012-3421 affects Performance Co-Pilot versions up to 3.6.4 and all versions from 2.1.1 to 2.2.
CVE-2012-3421 allows remote attackers to cause a denial of service by sending individual bytes of a PDU separately.
The vulnerable component in CVE-2012-3421 is the pduread function in the libpcp library.