First published: Mon Nov 12 2012(Updated: )
A security flaw was found in the way Performance Co-Pilot (PCP), a framework and services to support system-level performance monitoring and performance management, performed management of its temporary files used by various services from the suite. A local attacker could use this flaw to conduct symbolic link attacks (alter or remove different system files, accessible with the privileges of the user running the PCP suite, than it was originally intended). References: [1] <a href="https://bugzilla.novell.com/show_bug.cgi?id=782967">https://bugzilla.novell.com/show_bug.cgi?id=782967</a> (private)
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sgi Performance Co-pilot | <=3.6.9 | |
Sgi Performance Co-pilot | =2.1.1 | |
Sgi Performance Co-pilot | =2.1.2 | |
Sgi Performance Co-pilot | =2.1.3 | |
Sgi Performance Co-pilot | =2.1.4 | |
Sgi Performance Co-pilot | =2.1.5 | |
Sgi Performance Co-pilot | =2.1.6 | |
Sgi Performance Co-pilot | =2.1.7 | |
Sgi Performance Co-pilot | =2.1.8 | |
Sgi Performance Co-pilot | =2.1.9 | |
Sgi Performance Co-pilot | =2.1.10 | |
Sgi Performance Co-pilot | =2.1.11 | |
Sgi Performance Co-pilot | =2.2 | |
Sgi Performance Co-pilot | =3.6.4 | |
Sgi Performance Co-pilot | =3.6.5 | |
Sgi Performance Co-pilot | =3.6.6 | |
Sgi Performance Co-pilot | =3.6.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5530 is classified as a medium severity vulnerability.
To fix CVE-2012-5530, you should upgrade to Performance Co-Pilot version 3.6.10 or later.
CVE-2012-5530 is caused by improper management of temporary files in Performance Co-Pilot.
CVE-2012-5530 affects all versions of Performance Co-Pilot up to 3.6.9 and specific versions like 2.1.1 to 2.2.
No, CVE-2012-5530 requires local access for exploitation.