The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of BMC Performance: code execution via BGS_MULTIPLE_READS

Synthesis of the vulnerability 

An attacker can send a malicious command to BMC Performance (BMC PATROL Agent), in order to execute code with system privileges.
Impacted systems: PATROL, ProactiveNet Performance Management.
Severity of this alert: 3/4.
Creation date: 04/02/2011.
Références of this alert: BID-46151, CVE-2011-0975, QM001683974, VIGILANCE-VUL-10325, ZDI-11-039.

Description of the vulnerability 

The BMC Performance (BMC PATROL Agent) products install Service Daemon and Manager Daemon which listen on the port 6768/tcp by default.

However an attacker can send to this port a BGS_MULTIPLE_READS command indicating a large size, in order to corrupt the memory.

An attacker can therefore send a malicious command to BMC Performance (BMC PATROL Agent), in order to execute code with system privileges.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This threat impacts software or systems such as PATROL, ProactiveNet Performance Management.

Our Vigil@nce team determined that the severity of this computer threat is important.

The trust level is of type confirmed by the editor, with an origin of intranet client.

An attacker with a expert ability can exploit this cybersecurity bulletin.

Solutions for this threat 

BMC Performance: patch for BGS_MULTIPLE_READS.
A patch is available with the reference QM001683974.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a systems vulnerabilities bulletin. The technology watch team tracks security threats targeting the computer system.