Format string vulnerability in BMC PATROL Agent before 3.7.30 allows remote attackers to execute arbitrary code via format string specifiers in an invalid version number to TCP port 3181, which are not properly handled when writing a log message.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/33049 - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/499013/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/32692 - | |
References | () http://www.securitytracker.com/id?1021361 - | |
References | () http://www.vupen.com/english/advisories/2008/3379 - | |
References | () http://www.zerodayinitiative.com/advisories/ZDI-08-082/ - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/47175 - |
Information
Published : 2009-01-27 22:30
Updated : 2024-11-21 00:55
NVD link : CVE-2008-5982
Mitre link : CVE-2008-5982
CVE.ORG link : CVE-2008-5982
JSON object : View
Products Affected
bmc
- patrol_agent
CWE
CWE-134
Use of Externally-Controlled Format String