Vulnerability Details : CVE-2012-3421
The pduread function in pdu.c in libpcp in Performance Co-Pilot (PCP) before 3.6.5 does not properly time out connections, which allows remote attackers to cause a denial of service (pmcd hang) by sending individual bytes of a PDU separately, related to an "event-driven programming flaw."
Vulnerability category: Denial of service
Products affected by CVE-2012-3421
- cpe:2.3:a:sgi:performance_co-pilot:*:*:*:*:*:*:*:*
- cpe:2.3:a:sgi:performance_co-pilot:2.1.11:*:*:*:*:*:*:*
- cpe:2.3:a:sgi:performance_co-pilot:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:sgi:performance_co-pilot:2.1.9:*:*:*:*:*:*:*
- cpe:2.3:a:sgi:performance_co-pilot:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:sgi:performance_co-pilot:2.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:sgi:performance_co-pilot:2.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:sgi:performance_co-pilot:2.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:sgi:performance_co-pilot:2.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:sgi:performance_co-pilot:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:sgi:performance_co-pilot:2.1.10:*:*:*:*:*:*:*
- cpe:2.3:a:sgi:performance_co-pilot:2.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:sgi:performance_co-pilot:2.1.8:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-3421
4.90%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-3421
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
References for CVE-2012-3421
-
https://hermes.opensuse.org/messages/15540172
openSUSE.org - 503
-
http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git;a=blob;f=CHANGELOG;h=16c9cbb2f61d909487ea1c3171f4ab33e5648ac5;hb=fe51067ae869a4d59f350ac319b09edcb77ac8e6
High Performance Computing Solutions – Reliable, Available, Scalable HPC Systems | HPE
-
http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00024.html
[security-announce] SUSE-SU-2013:0190-1: important: Security update for
-
http://www.debian.org/security/2012/dsa-2533
-
http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085333.html
[SECURITY] Fedora 17 Update: pcp-3.6.5-1.fc17
-
https://hermes.opensuse.org/messages/15471040
openSUSE.org - 503
-
http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git;a=commit;h=9ba85dca940de976176ce196fd5e3c4170936354
High Performance Computing Solutions – Reliable, Available, Scalable HPC Systems | HPE
-
http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085324.html
[SECURITY] Fedora 16 Update: pcp-3.6.5-1.fc16
-
https://bugzilla.redhat.com/show_bug.cgi?id=841706
841706 – (CVE-2012-3421) CVE-2012-3421 pcp: event-driven programming flaw blocks pmcd from responding to other legitimate requests
-
https://hermes.opensuse.org/messages/15540133
openSUSE.org - 503
-
http://www.openwall.com/lists/oss-security/2012/08/16/1
oss-security - pcp: Multiple security flaws
Jump to