Description
libpcp in Performance Co-Pilot (PCP) before 3.6.5 allows remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a PDU with the numcreds field value greater than the number of actual elements to the __pmDecodeCreds function in p_creds.c; (2) the string byte number value to the __pmDecodeNameList function in p_pmns.c; (3) the numids value to the __pmDecodeIDList function in p_pmns.c; (4) unspecified vectors to the __pmDecodeProfile function in p_profile.c; the (5) status number value or (6) string number value to the __pmDecodeNameList function in p_pmns.c; (7) certain input to the __pmDecodeResult function in p_result.c; (8) the name length field (namelen) to the DecodeNameReq function in p_pmns.c; (9) a crafted PDU_FETCH request to the __pmDecodeFetch function in p_fetch.c; (10) the namelen field in the __pmDecodeInstanceReq function in p_instance.c; (11) the buflen field to the __pmDecodeText function in p_text.c; (12) PDU_INSTANCE packets to the __pmDecodeInstance in p_instance.c; or the (13) c_numpmid or (14) v_numval fields to the __pmDecodeLogControl function in p_lcontrol.c, which triggers integer overflows, heap-based buffer overflows, and/or buffer over-reads.
Published: 2012-08-27
Score: 5.0 Medium
EPSS: 3.6% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-2533-1 pcp security update
EUVD EUVD EUVD-2012-3388 libpcp in Performance Co-Pilot (PCP) before 3.6.5 allows remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a PDU with the numcreds field value greater than the number of actual elements to the __pmDecodeCreds function in p_creds.c; (2) the string byte number value to the __pmDecodeNameList function in p_pmns.c; (3) the numids value to the __pmDecodeIDList function in p_pmns.c; (4) unspecified vectors to the __pmDecodeProfile function in p_profile.c; the (5) status number value or (6) string number value to the __pmDecodeNameList function in p_pmns.c; (7) certain input to the __pmDecodeResult function in p_result.c; (8) the name length field (namelen) to the DecodeNameReq function in p_pmns.c; (9) a crafted PDU_FETCH request to the __pmDecodeFetch function in p_fetch.c; (10) the namelen field in the __pmDecodeInstanceReq function in p_instance.c; (11) the buflen field to the __pmDecodeText function in p_text.c; (12) PDU_INSTANCE packets to the __pmDecodeInstance in p_instance.c; or the (13) c_numpmid or (14) v_numval fields to the __pmDecodeLogControl function in p_lcontrol.c, which triggers integer overflows, heap-based buffer overflows, and/or buffer over-reads.
References
Link Providers
http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085324.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085333.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00024.html cve-icon cve-icon
http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=blob%3Bf=CHANGELOG%3Bh=16c9cbb2f61d909487ea1c3171f4ab33e5648ac5%3Bhb=fe51067ae869a4d59f350ac319b09edcb77ac8e6 cve-icon cve-icon
http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=commit%3Bh=b441980d53be1835b25f0cd6bcc0062da82032dd cve-icon cve-icon
http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=commit%3Bh=babd6c5c527f87ec838c13a1b4eba612af6ea27c cve-icon cve-icon
http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=commit%3Bh=e4faa1f0ba29151340920d975fc7639adf8371d5 cve-icon cve-icon
http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=commit%3Bh=f190942b552aa80d59bbe718866aa00b8e3fd5cc cve-icon cve-icon
http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=commitdiff%3Bh=49c679c44425915a8d6aa4af5f90b35384843c12 cve-icon cve-icon
http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=commitdiff%3Bh=7eb479b91ef12bf89a15b078af2107c8c4746a4a cve-icon cve-icon
http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=commitdiff%3Bh=9f4e392c97ce42744ec73f82268ce6c815fdca0e cve-icon cve-icon
http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=commitdiff%3Bh=bfb3ab8c6b3d75b1a6580feee76a7d0925a3633c cve-icon cve-icon
http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=commitdiff%3Bh=cced6012b4b93bfb640a9678589ced5416743910 cve-icon cve-icon
http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=commitdiff%3Bh=f0eaefe046b1061797f45b0c20bb2ac371b504a5 cve-icon cve-icon
http://www.debian.org/security/2012/dsa-2533 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2012/08/16/1 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=840822 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=840920 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=841112 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=841126 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=841159 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=841180 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=841183 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=841240 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=841249 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=841284 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=841698 cve-icon cve-icon
https://hermes.opensuse.org/messages/15471040 cve-icon cve-icon
https://hermes.opensuse.org/messages/15540133 cve-icon cve-icon
https://hermes.opensuse.org/messages/15540172 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2012-3418 cve-icon
https://www.cve.org/CVERecord?id=CVE-2012-3418 cve-icon
History

No history.

Subscriptions

Sgi Performance Co-pilot
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T20:05:12.135Z

Reserved: 2012-06-14T00:00:00.000Z

Link: CVE-2012-3418

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2012-08-27T23:55:02.040

Modified: 2026-04-29T01:13:23.040

Link: CVE-2012-3418

cve-icon Redhat

Severity : Important

Publid Date: 2012-08-16T00:00:00Z

Links: CVE-2012-3418 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses