Stack-based buffer overflow in BMC PATROL Agent Service Daemon for in Performance Analysis for Servers, Performance Assurance for Servers, and Performance Assurance for Virtual Servers 7.4.00 through 7.5.10; Performance Analyzer and Performance Predictor for Servers 7.4.00 through 7.5.10; and Capacity Management Essentials 1.2.00 (7.4.15) allows remote attackers to execute arbitrary code via a crafted length value in a BGS_MULTIPLE_READS command to TCP port 6768.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
http://securityreason.com/securityalert/8076 | third party advisory |
http://www.vupen.com/english/advisories/2011/0286 | vdb entry vendor advisory |
http://osvdb.org/70788 | vdb entry |
http://www.zerodayinitiative.com/advisories/ZDI-11-039 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/65135 | vdb entry |
http://www.securityfocus.com/bid/46151 | vdb entry |
http://secunia.com/advisories/43177 | third party advisory vendor advisory |
http://www.securityfocus.com/archive/1/516188/100/0/threaded | mailing list |