← Voltar para CVEs
CVE-2012-3420
N/ADescricao
Multiple memory leaks in Performance Co-Pilot (PCP) before 3.6.5 allow remote attackers to cause a denial of service (memory consumption or daemon crash) via a large number of PDUs with (1) a crafted context number to the DoFetch function in pmcd/src/dofetch.c or (2) a negative type value to the __pmGetPDU function in libpcp/src/pdu.c.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado8/27/2012
Ultima modificacao4/11/2025
Fontenvd
Avistamentos honeypot0
Produtos afetados
sgi:performance_co-pilot
Fraquezas (CWE)
CWE-399
Referencias
http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085324.html(secalert@redhat.com)
http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085333.html(secalert@redhat.com)
http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00024.html(secalert@redhat.com)
http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=blob%3Bf=CHANGELOG%3Bh=16c9cbb2f61d909487ea1c3171f4ab33e5648ac5%3Bhb=fe51067ae869a4d59f350ac319b09edcb77ac8e6(secalert@redhat.com)
http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=commit%3Bh=68fb968b4ee635bb301dc9ab64e633b0d66d27b4(secalert@redhat.com)
http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=commit%3Bh=a7dc844d3586ea79887655a97c4252a79751fdae(secalert@redhat.com)
http://www.debian.org/security/2012/dsa-2533(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2012/08/16/1(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=841298(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=841319(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=841704(secalert@redhat.com)
https://hermes.opensuse.org/messages/15471040(secalert@redhat.com)
https://hermes.opensuse.org/messages/15540133(secalert@redhat.com)
https://hermes.opensuse.org/messages/15540172(secalert@redhat.com)
http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085324.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085333.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00024.html(af854a3a-2127-422b-91ae-364da2661108)
http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=blob%3Bf=CHANGELOG%3Bh=16c9cbb2f61d909487ea1c3171f4ab33e5648ac5%3Bhb=fe51067ae869a4d59f350ac319b09edcb77ac8e6(af854a3a-2127-422b-91ae-364da2661108)
http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=commit%3Bh=68fb968b4ee635bb301dc9ab64e633b0d66d27b4(af854a3a-2127-422b-91ae-364da2661108)
http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=commit%3Bh=a7dc844d3586ea79887655a97c4252a79751fdae(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2012/dsa-2533(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2012/08/16/1(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=841298(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=841319(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=841704(af854a3a-2127-422b-91ae-364da2661108)
https://hermes.opensuse.org/messages/15471040(af854a3a-2127-422b-91ae-364da2661108)
https://hermes.opensuse.org/messages/15540133(af854a3a-2127-422b-91ae-364da2661108)
https://hermes.opensuse.org/messages/15540172(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.